TY - GEN
T1 - Securing real-time opportunistic spectrum access in cognitive networks against malicious secondary users
AU - Reddy, Swetha
AU - Cushman, Isaac
AU - Rawat, Danda B.
AU - Song, Min
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015
Y1 - 2015
N2 - Communications in future wireless systems are expected to rely on opportunistic RF spectrum access where unlicensed secondary users either sense RF spectrum to find idle channels or search for idle channels in a geolocation database of idle spectrum. To avoid channel sensing uncertainties, the FCC mandates that secondary users should query geolocation database to find idle channels for given location and time to communicate opportunistically. However, malicious secondary users can fake their geolocations using GPS spoofing techniques to pretend to be in a place where more idle channels are available. In this paper, we implement and investigate how to secure real-time opportunistic spectrum access in cloud based cognitive radio networks (aka ROAR) against malicious secondary users using angle-of- arrival, received signal strength and time-of- arrival. The proposed approach checks the legitimacy of geolocation reported by the secondary users using cloud computing platform before releasing any idle channel information to them to protect licensed primary users. We implement three step detection process to differentiate the legitimate secondary users from malicious ones which help secure ROAR against untrustworthy secondary users. The proposed approach is illustrated through numerical results obtained from both simulations and experiments.
AB - Communications in future wireless systems are expected to rely on opportunistic RF spectrum access where unlicensed secondary users either sense RF spectrum to find idle channels or search for idle channels in a geolocation database of idle spectrum. To avoid channel sensing uncertainties, the FCC mandates that secondary users should query geolocation database to find idle channels for given location and time to communicate opportunistically. However, malicious secondary users can fake their geolocations using GPS spoofing techniques to pretend to be in a place where more idle channels are available. In this paper, we implement and investigate how to secure real-time opportunistic spectrum access in cloud based cognitive radio networks (aka ROAR) against malicious secondary users using angle-of- arrival, received signal strength and time-of- arrival. The proposed approach checks the legitimacy of geolocation reported by the secondary users using cloud computing platform before releasing any idle channel information to them to protect licensed primary users. We implement three step detection process to differentiate the legitimate secondary users from malicious ones which help secure ROAR against untrustworthy secondary users. The proposed approach is illustrated through numerical results obtained from both simulations and experiments.
KW - Cognitive radio security
KW - GPS spoofing
KW - Geolocation database
KW - Opportunistic spectrum access
KW - Securing ROAR
UR - http://www.scopus.com/inward/record.url?scp=84971233917&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84971233917&partnerID=8YFLogxK
U2 - 10.1109/GLOCOMW.2015.7414018
DO - 10.1109/GLOCOMW.2015.7414018
M3 - Conference contribution
AN - SCOPUS:84971233917
T3 - 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings
BT - 2015 IEEE Globecom Workshops, GC Wkshps 2015 - Proceedings
T2 - IEEE Globecom Workshops, GC Wkshps 2015
Y2 - 6 December 2015 through 10 December 2015
ER -