Digital signatures for centralized DSA networks

Chetan N. Mathur, K. P. Subbalakshmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

55 Scopus citations

Abstract

Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. Li this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.

Original languageEnglish
Title of host publication2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
Pages1037-1041
Number of pages5
DOIs
StatePublished - 2007
Event2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 - Las Vegas, NV, United States
Duration: 11 Jan 200713 Jan 2007

Publication series

Name2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007

Conference

Conference2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
Country/TerritoryUnited States
CityLas Vegas, NV
Period11/01/0713/01/07

Keywords

  • Cognitive radio
  • Denial of service attack
  • Digital signature
  • Dynamic spectrum access

Fingerprint

Dive into the research topics of 'Digital signatures for centralized DSA networks'. Together they form a unique fingerprint.

Cite this