Securing real-time opportunistic spectrum access in cognitive networks against malicious secondary users

Swetha Reddy, Isaac Cushman, Danda B. Rawat, Min Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Communications in future wireless systems are expected to rely on opportunistic RF spectrum access where unlicensed secondary users either sense RF spectrum to find idle channels or search for idle channels in a geolocation database of idle spectrum. To avoid channel sensing uncertainties, the FCC mandates that secondary users should query geolocation database to find idle channels for given location and time to communicate opportunistically. However, malicious secondary users can fake their geolocations using GPS spoofing techniques to pretend to be in a place where more idle channels are available. In this paper, we implement and investigate how to secure real-time opportunistic spectrum access in cloud based cognitive radio networks (aka ROAR) against malicious secondary users using angle-of- arrival, received signal strength and time-of- arrival. The proposed approach checks the legitimacy of geolocation reported by the secondary users using cloud computing platform before releasing any idle channel information to them to protect licensed primary users. We implement three step detection process to differentiate the legitimate secondary users from malicious ones which help secure ROAR against untrustworthy secondary users. The proposed approach is illustrated through numerical results obtained from both simulations and experiments.

Original languageEnglish
Title of host publication2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings
ISBN (Electronic)9781467395267
DOIs
StatePublished - 2015
EventIEEE Globecom Workshops, GC Wkshps 2015 - San Diego, United States
Duration: 6 Dec 201510 Dec 2015

Publication series

Name2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings

Conference

ConferenceIEEE Globecom Workshops, GC Wkshps 2015
Country/TerritoryUnited States
CitySan Diego
Period6/12/1510/12/15

Keywords

  • Cognitive radio security
  • GPS spoofing
  • Geolocation database
  • Opportunistic spectrum access
  • Securing ROAR

Fingerprint

Dive into the research topics of 'Securing real-time opportunistic spectrum access in cognitive networks against malicious secondary users'. Together they form a unique fingerprint.

Cite this