cognitive radio network security
DESCRIPTION
Cognitive Radio Network Security A taxonomy of CR security threatsPrimary user emulation attacksByzantine failures in distributed spectrum sensingSecurity vulnerabilities in IEEE 802.22TRANSCRIPT
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 1/34
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 2/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"# 2
/u)line
A )'0onomy o1 %+ securi)y )&re')s
2rim'ry user emul')ion '))'cks
By3'n)ine 1'ilures in is)ribu)e sec)rum sensing
ecuri)y vulner'bili)ies in 4EEE 5!.
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 3/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"# 3
4n)rouc)ion
uccess1ul eloymen) o1 %+ ne)-orks 'n )&e re'li3')ion o1)&eir bene1i)s -ill een on )&e l'cemen) o1 essen)i'lsecuri)y mec&'nisms
Emergence o1 )&e oor)unis)ic sec)rum s&'ring (/#'r'igm 'n cogni)ive r'io )ec&nology r'ises ne- securi)yimlic')ions )&') &'ve no) been s)uie reviously
+ese'rc&ers &'ve only recen)ly s)'r)e )o e0'mine )&e securi)yissues seci1ic )o %+ evices 'n ne)-orks
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 4/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
ome +ecen) 2ublic')ions on %+ecuri)y
4
• +. %&en, 6. 2'rk, 7 6. +ee, “De1ense 'g'ins) rim'ry useremul')ion '))'cks in cogni)ive r'io ne)-orks,” IEEE Journal onSelected Areas in Communications, vol. 8, no. $, 6'n. !!5.
• +. %&en, 6. 2'rk, T. Hou, 7 6. +ee, “To-'r secure is)ribu)e
sec)rum sensing in cogni)ive r'io ne)-orks,” IEEE Comm.Magaine, vol. 98, no. 9, !!5.
• . :i'o, 6. 2'rk, 'n Y. Ye, “T'mer +esis)'nce 1or o1)-'reDe1ine +'io o1)-'re,” IEEE Computer So!tware and
Applications Con!erence, 6uly !!".
• ;. Bi'n 'n 6. 2'rk, “ecuri)y <ulner'bili)ies in 4EEE 5!.,”
"ourt# International $ireless Internet Con!erence, Nov. !!5.
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 5/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
ome +ecen) 2ublic')ions on %+ecuri)y
• T. %l'ncy, N. =oergen, “ecuri)y in %ogni)ive +'io Ne)-orks>T&re')s 'n Mi)ig')ion,” Int%l Con!erence on Cognitive Radio&riented $ireless Networks and Communications, M'y !!5.
• T.B. Bro-n 'n A. e)&i, “2o)en)i'l cogni)ive r'io eni'l?o1?service vulner'bili)ies 'n ro)ec)ion coun)erme'sures> 'mul)i?imension'l 'n'lysis 'n 'ssessmen),” Journal o! Mo'ileNetworks and Applications, vol. $@, no. *, /c). !!5.
• A. Br'-erm'n e) 'l., “To-'rs ' 1r'u?reven)ion 1r'me-ork1or so1)-'re e1ine r'io mobile evices,” E(RASIP Journal on$ireless Comm. and Networking, vol. !!*, no. @, !!*.
• .B. Mic&'el e) 'l., “A 1r'me-ork 1or secure o-nlo' 1orso1)-'re?e1ine r'io,” IEEE Comm. Magaine, 6uly !!.
• 2. l'nig'n e) 'l., “Dyn'mic olicy en1orcemen) 1or so1)-'ree1ine r'io,” )*t# Annual Simulation S+mposium, !!*.
5
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 6/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
A T'0onomy o1 %+ ecuri)y T&re')s
6
C R n e t w o r k
s e c u r i t y t h r e a t s
R a d i o s o f t w a r e
s e c u r i t y t h r e a t s
S p e c t r u m a c c e s s -
r e l a t e d s e c u r i t y t h r e a t s
T h r e a t s t o i n c u m b e n t
c o e x i s t e n c e m e c h a n i s m s
T h r e a t s t o s e l f -
c o e x i s t e n c e m e c h a n i s m s
• S e c u r i t y t h r e a t s t o t h e
s o f t w a r e d o w n l o a d p r o c e s s
• S p e c t r a l “ h o n e y p o t s ”
• S e n s o r y m a n i p u l a t i o n :
- P r i m a r y u s e r e m u l a t i o n
- e o s p a t i a l m a n i p u l a t i o n
- C h a ! p o i n t a t t a c k
- S p a m p o i n t b i a s a t t a c k
• " b s t r u c t s y n c h r o n i # a t i o n o f $ P s
• T x f a l s e % s p u r i o u s i n t e r - c e l l
b e a c o n s & c o n t r o l m e s s a ' e s (
• ) x p l o i t % o b s t r u c t i n t e r - c e l l
s p e c t r u m s h a r i n ' p r o c e s s e s
• * n a u t h o r i # e d p o l i c y c h a n ' e s
• T a m p e r i n ' w % C R r e a s o n e r s
& e + ' + , S y s t e m S t r a t e ' y R e a s o n e r
P o l i c y R e a s o n e r (
• S o f t w a r e . P t h e f t
• S o f t w a r e t a m p e r i n '
• . n / e c t i o n o f f a l s e % f o r ' e d
p o l i c i e s
• . n / e c t i o n o f f a l s e % f o r ' e d
S 0 u p d a t e s
• . n / e c t i o n o f m a l i c i o u s S 0
& 1 i r u s e s (
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 7/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
T&e 4mor)'nce o1 Dis)inguis&ing2rim'ry Csers 1rom econ'ry Csers
ec)rum us'ge scen'rio 1or ' secon'ry user 2erioic'lly se'rc& 1or sec)rum “-&i)e s'ces” (i.e.,
1'llo- b'ns# )o )r'nsmi)receive ')'
W&en ' rim'ry user is e)ec)e in i)s sec)rum b'n
4mmei')ely v'c')e )&') b'n 'n s-i)c& )o ' v'c'n)one “ver)ic'l sec)rum s&'ring”
W&en 'no)&er secon'ry user is e)ec)e in i)ssec)rum b'n W&en )&ere 're no be))er sec)rum oor)uni)ies, i)
m'y c&oose )o s&'re )&e b'n -i)& )&e e)ec)esecon'ry user “&ori3on)'l sec)rum s&'ring”
%+ MA% ro)ocol gu'r'n)ees 1'ir resource 'lloc')ion'mong secon'ry users
7
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 8/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
2rim'ry Cser Emul')ion A))'cks
8
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 9/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
E0is)ing Tec&niue ($#> Csing EnergyDe)ec)ion )o %onuc) ec)rum ensing
Trus) moel An energy e)ec)or me'sures + energy or )&e +
)o e)ermine -&e)&er ' given c&'nnel is ile or no)
econ'ry users c'n recogni3e e'c& o)&erFs sign'ls
'n s&'re ' common ro)ocol, 'n )&ere1ore 're 'ble)o ien)i1y e'c& o)&er
41 'n unien)i1ie user is e)ec)e, i) is consiere 'rim'ry user
9
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 10/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
E0is)ing Tec&niue ($#> Csing EnergyDe)ec)ion )o %onuc) ec)rum ensing
2roblem> 41 ' m'licious secon'ry user)r'nsmi)s ' sign'l )&') is no) recogni3e byo)&er secon'ry users, i) -ill be ien)i1ie 's 'rim'ry user by )&e o)&er secon'ry users
4n)er1erence )o rim'ry users 2reven)s o)&er secon'ry users 1rom 'ccessing )&')
b'n
10
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 11/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
E0is)ing Tec&niue (#> M')c&e il)er 'n%yclos)')ion'ry e')ure De)ec)ion
Trus) moel M')c&e 1il)er 'n cyclos)')ion'ry 1e')ure e)ec)ors
're 'ble )o recogni3e )&e is)inguis&ingc&'r'c)eris)ics o1 rim'ry user sign'ls
econ'ry users c'n ien)i1y e'c& o)&erFs sign'ls 2roblem> 41 ' m'licious secon'ry user
)r'nsmi)s sign'ls )&') emul')e )&ec&'r'c)eris)ics o1 rim'ry user sign'ls, i) -ill beien)i1ie 's ' rim'ry user by )&e o)&er
secon'ry users 4n)er1erence )o rim'ry users
2reven)s o)&er secon'ry users 1rom 'ccessing )&')b'n
11
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 12/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
E0is)ing Tec&niue (@#> Guie) 2erio1or ec)rum ensing
Trus) moel De1ine ' “uie) erio” )&') 'll secon'ry users s)o
)r'nsmission. 4) is eic')e 1or sec)rum sensing.
Any user e)ec)e in )&e uie) erio (using energy
e)ec)or, m')c&e 1il)er or cyclos)')ion'ry 1e')uree)ec)or# is ' rim'ry user
2roblem> 41 ' m'licious secon'ry user )r'nsmi)ssign'ls in )&e uie) erio, i) -ill be ien)i1ie 's' rim'ry user by )&e o)&er secon'ry users 4n)er1erence )o rim'ry users
2reven)s o)&er secon'ry users 1rom 'ccessing )&')b'n
12
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 13/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
T&e Disru)ive E11ec)s o1 2rim'ry CserEmul')ion A))'cks
13
Malicious PUE attacksSelfish PUE attacks
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 14/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
Tr'nsmi))er <eri1ic')ion 1or ec)rumensing
Tr'nsmi))er veri1ic')ion 1or sec)rum sensing iscomose o1 )&ree rocesses>
<eri1ic')ion o1 sign'l c&'r'c)eris)ics
Me'suremen) o1 receive sign'l energy level
oc'li3')ion o1 )&e sign'l source
14
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 15/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
A lo-c&'r) o1 )r'nsmi))er veri1ic')ion
15
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 16/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
%&'llenges in 2T oc'li3')ion
2rim'ry sign'l )r'nsmi))er (2T# loc'li3')ion is morec&'llenging )&'n )&e s)'n'r loc'li3')ion roblem ue )o )-ore'sons
No moi1ic')ion s&oul be m'e )o rim'ry users )o'ccommo')e )&e DA o1 license sec)rum. T&is
reuiremen) e0clues )&e ossibili)y o1 using ' loc'li3')ionro)ocol )&') involves )&e in)er'c)ion be)-een ' rim'ryuser 'n )&e loc'li3')ion evice(s#.
2T loc'li3')ion roblem is ' non?in)er'c)iveloc'li3')ion roblem
W&en ' receiver is loc'li3e, one oes no) nee )o consier)&e e0is)ence o1 o)&er receivers. Ho-ever, )&e e0is)ence o1mul)ile )r'nsmi))ers m'y ' i11icul)y )o )r'nsmi))erloc'li3')ion
16
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 17/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
A solu)ion )o 2T oc'li3')ion
M'gni)ue o1 'n + v'lue )yic'lly ecre'ses 's )&e is)'ncebe)-een )&e sign'l )r'nsmi))er 'n )&e receiver incre'ses
41 one is 'ble )o collec) ' su11icien) number o1 +me'suremen)s 1rom ' grou o1 receivers sre' )&roug&ou) 'l'rge ne)-ork, )&e loc')ion -i)& )&e e'k + v'lue is likely )o
be )&e loc')ion o1 ' )r'nsmi))er.
Av'n)'ge o1 )&is )ec&niue is )-o1ol,
/bvi')es moi1ic')ion o1 rim'ry users 'n
uor)s loc'li3ing mul)ile )r'nsmi))ers )&') )r'nsmi)sign'ls simul)'neously
17
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 18/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
By3'n)ine 1'ilures in is)ribu)esec)rum sensing
%'use o1 By3'n)ine 1'ilures in is)ribu)e sec)rumsensing (D#
M'l1unc)ioning sensing )ermin'ls
ec)rum sensing ')' 1'lsi1ic')ion (D# '))'cks
A m'licious secon'ry user in)en)ion'lly sens 1'lsi1ie loc'lsec)rum sensing reor)s )o )&e ')' collec)or in 'n '))em) )oc'use )&e ')' collec)or )o m'ke incorrec) sec)rum sensingecisions
18
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 19/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
D A))'cks
19
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 20/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
Moeling o1 D 's ' 'r'llel 1usionne)-ork
We c'n moel )&e D roblem 's ' 'r'llel 1usionne)-ork
20
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 21/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
D')' 1usion 'lgori)&ms 1or D
Decision 1usion
B'yesi'n e)ec)ion
Neym'n?2e'rson )es)
Weig&)e seuen)i'l rob'bili)y r')io )es) (W2+T#
21
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 22/34
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 23/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
/er')ing Environmen) o1 5!. Ne)-orks
23
TV transmitters
WRANBase Station
Wirelessmicrophones
Wirelessmicrophones
WRANBase Station
: CPE (Consumer Premise Equipment)
: WRAN Base Station
Typical ~33km
Max. 100km
Incumbent services:• TV broacast services• Part !" evices (#ire$ess microp%ones)
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 24/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
2HY?'yer uor) 1or %oe0is)ence
T-o?s)'ge sec)rum sensing in uie) erios (G2s#
's) sensing s)'ge> ' uick 'n simle e)ec)ion )ec&niue,e.g., energy e)ec)ion.
ine sensing s)'ge> me'suremen)s 1rom 1's) sensing
e)ermine )&e nee 'n ur')ion o1 1ine sensing s)'ge. ync&roni3')ion o1 overl'ing BsF G2s
24
BS1
BS2
Time
BS3
Fast sensing 802.22 TransmissionFine sensing
Cannel !etection Time
Fast sensing Fine sensing
Cannel !etection Time
Fast sensing Fine sensing
Cannel !etection Time
Fast sensing Fine sensing
Cannel !etection Time
Fast sensing Fine sensing
Cannel !etection Time
Fast sensing Fine sensing
Cannel !etection Time
Fast sensing Fine sensing
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 25/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
%ogni)ive MA% (%MA%# 'yer($#
T-o )yes con)rol mess'ges
M'n'gemen) mess'ges> in)r'?cell m'n'gemen)
Be'cons> in)er?cell coorin')ion
4n)er?cell sync&roni3')ion
r'me o11se) is con)'ine in be'con 'ylo' T&e receiver B er1orms 1r'me sliing )o sync&roni3e -i)&
)&e )r'nsmi))er B.
25
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 26/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
%ogni)ive MA% (%MA%# 'yer(# 4n)er?B yn'mic resource s&'ring
Neee -&en Go o1 'mi))e service -orklo' c'nno) bes')is1ie
5!. rescribes non?e0clusive 7 e0clusive sec)rum s&'ring
/n?em'n sec)rum con)en)ion (/D%# ro)ocol elec) ' )'rge) c&'nnel )o con)en
E'c& B selec)s ' %&'nnel %on)en)ion Number (%%N# 1romI!,$ J.
B -i)& ' gre')er %%N -ins )&e 'ir?-ise con)en)ionroceure.
B -ins )&e c&'nnel i1 i) -ins 'll 'ir?-ise con)en)ionroceures -i)& 'll co?c&'nnel Bs.
4n)er?cell be'cons use )o c'rry ou) /D%
26
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 27/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
%ogni)ive MA% (%MA%# 'yer(@#
2ro)ec)ion o1 2'r) K9 evices (-ireless micro&ones#
%l'ss A solu)ion
A se'r')e be'con evice eloye
Tr'nsmi) s&or) -ireless micro&one be'cons (WMB#
Cse WMBs )o no)i1y colloc')e 5!. cells 'bou) oer')iono1 2'r) K9 evices
%l'ss B solu)ion
A seci'l )ye o1 %2E is eloye
%l'ss B %2Es e)ec) 2'r) K9
evice oer')ions 'n no)i1yo)&er 5!. sys)ems
27
WRAN
Base Station
WirelessMIC
Class B CPE
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 28/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
/vervie- o1 5!.Fs ecuri)y ubl'yer
5!. securi)y subl'yer rovies con1ien)i'li)y, 'u)&en)ic')ion 'nin)egri)y services 1or in)r'?cell m'n'gemen) mess'ges
2;M (2riv'cy ;ey M'n'gemen)# ro)ocol
Enc'sul')ion ro)ocol
4) 1'ils )o ro)ec) in)er?cell be'cons use in coe0is)ence mec&'nisms
28
%MA% mec&'nismsro)ec)e by
5!.Fs securi)ysubl'yer
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 29/34
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 30/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
ecuri)y <ulner'bili)ies in 4n)er?%ell%oe0is)ence Mec&'nisms
4n)er?cell be'cons 're no) ro)ec)e by 5!.Fssecuri)y subl'yerL
Be'con 'lsi1ic')ion (B# '))'ck
T-o )yes o1 B '))'cks
T0 o1 1'lse1orge in)er?cell be'cons )o isru) sec)rum con)en)ion rocesses
Ne)-ork )&roug&u) ro
in)er1ere -i)& in)er?cell sync&roni3')ion Cnermine )&e 'ccur'cy o1 sec)rum sensing
@!
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 31/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
Disru)ing 4n)er?cell ec)rum %on)en)ion
/bec)ive o1 B '))'cks
Disru) sel1?coe0is)ence mec&'nisms (sec)rum con)en)ion rocesses#
A))'ck me)&o
orge in)er?cell be'cons -i)& 'rbi)r'rily l'rge %%N v'lue(e.g., selec) %%N 1rom I$ , $ J, -&ere O $#
T0 be'cons )&') con)'in l'rge %%N )o neig&boring Bs 4m'c) o1 B '))'cks
egi)im')e vic)im Bs lose )&e )'rge) c&'nnels.
Dro in ne)-ork )&roug&u)
31
, O $
imul')ion l'you) 'n resul)s
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 32/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
4n)er1ering -i)& 4n)er?cell ync&roni3')ion
/bec)ive o1 B '))'ck
Cnermine e11ic'cy o1 incumben) coe0is)ence mec&'nism (sec)rumsensing#
A))'ck me)&o
orge in)er?cell be'cons -i)& surious r'me /11se)
4m'c) o1 B '))'ck <ic)im B er1orms 1r'me sliing 'ccoring )o )&e surious r'me /11se),
-&ic& c'uses 'sync&rony o1 G2s.
Async&rony c'uses sel1?in)er1erence )&') egr'es 'ccur'cy o1 sec)rumsensing uring G2s.
4m'c) on mise)ec)ion rob'bili)y (1or energy e)ec)or#
An incumben) sign'l is e)ec)e i1 - r (es)im')e +0 sign'l o-er, - , isgre')er )&'n )&res&ol r #.
Cner B '))'cks, sel1?in)er1erence in G2s c'uses )&e )&res&ol )o incre'se)o ' l'rger v'lue, r ..
Miss e)ec)ion rob'bili)y incre'ses by
32
*
*Pr( ) ( )r
Y r
r Y r f x dx< < = ∫
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 33/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December !!"#
%oun)erme'sures
To )&-'r) )&e 1orgery o1 in)er?cell be'cons, 'n in)er?cell keym'n'gemen) sc&eme is neee
C)ili3e )&e b'ck&'ul in1r's)ruc)ure )&') connec)s mul)ile cells
Emloy ' is)ribu)e key m'n'gemen) sc&eme
@@
5!. b'ck&'ulin1r's)ruc)ure
7/21/2019 Cognitive Radio Network Security
http://slidepdf.com/reader/full/cognitive-radio-network-security 34/34
“Cognitive Radio Communications and Networks: Principles and Practice” By A M Wyglinski M Nekovee Y T Hou (Elsevier December !!"# 34
%&')er $* umm'ry
Emergence o1 )&e oor)unis)ic sec)rum s&'ring (/#'r'igm 'n cogni)ive r'io )ec&nology r'ises ne-securi)y imlic')ions )&') &'ve no) been s)uiereviously
/ne coun)erme'sure 1or rim'ry user emul')ion '))'cks is)r'nsmi))er veri1ic')ionP i) is comose o1 @ rocesses>
<eri1ic')ion o1 sign'l c&'r'c)eris)ics
Me'suremen) o1 receive sign'l energy level
oc'li3')ion o1 )&e sign'l source
We c'n moel )&e is)ribu)e sec)rum sensing roblem's ' 'r'llel 1usion ne)-ork )o e'l -i)& By3'n)ine 1'ilures
4EEE 5!. is vulner'ble )o '))'cks bec'use i)s in)er?cellbe'cons 're no) ro)ec)e