TY - GEN
T1 - Digital signatures for centralized DSA networks
AU - Mathur, Chetan N.
AU - Subbalakshmi, K. P.
PY - 2007
Y1 - 2007
N2 - Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. Li this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.
AB - Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. Li this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.
KW - Cognitive radio
KW - Denial of service attack
KW - Digital signature
KW - Dynamic spectrum access
UR - http://www.scopus.com/inward/record.url?scp=36348952490&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=36348952490&partnerID=8YFLogxK
U2 - 10.1109/CCNC.2007.209
DO - 10.1109/CCNC.2007.209
M3 - Conference contribution
AN - SCOPUS:36348952490
SN - 1424406668
SN - 9781424406661
T3 - 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
SP - 1037
EP - 1041
BT - 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
T2 - 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
Y2 - 11 January 2007 through 13 January 2007
ER -