TY - GEN
T1 - Security Mechanisms to Defend against New Attacks on Software-Defined Radio
AU - Li, Ke
AU - Yu, Xiangzhan
AU - Zhang, Hongli
AU - Wu, Longfei
AU - Du, Xiaojiang
AU - Ratazzi, Paul
AU - Guizani, Mohsen
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/6/19
Y1 - 2018/6/19
N2 - Software-defined radio (SDR) enables the flexible and efficient use of spectrum, which is a key technology to maintain high quality wireless services in the future. However, the flexibility of SDR brings serious security concerns of malicious attacks to the radio equipment. In this paper, we present a novel defense scheme for SDR to avoid the configuration parameters being tampered by malicious software, even if the operating system is comprised. Three manipulation attacks of radio parameters are considered. We developed a module called Security Monitor which is deployed below the operating system (OS) level and above the hardware level, to monitor and verify the configuration parameters in a timely manner. To demonstrate the effectiveness and efficiency of the proposed security mechanism, we implemented the Security Monitor on Ettus Universal Software Radio Peripheral (USRP) software-defined radio nodes, and evaluated its overhead. The experimental results show that the time overheads to detect the three types of manipulation attacks are 2.9 microsecond, 2.86 microsecond, and 3.4 microsecond, respectively.
AB - Software-defined radio (SDR) enables the flexible and efficient use of spectrum, which is a key technology to maintain high quality wireless services in the future. However, the flexibility of SDR brings serious security concerns of malicious attacks to the radio equipment. In this paper, we present a novel defense scheme for SDR to avoid the configuration parameters being tampered by malicious software, even if the operating system is comprised. Three manipulation attacks of radio parameters are considered. We developed a module called Security Monitor which is deployed below the operating system (OS) level and above the hardware level, to monitor and verify the configuration parameters in a timely manner. To demonstrate the effectiveness and efficiency of the proposed security mechanism, we implemented the Security Monitor on Ettus Universal Software Radio Peripheral (USRP) software-defined radio nodes, and evaluated its overhead. The experimental results show that the time overheads to detect the three types of manipulation attacks are 2.9 microsecond, 2.86 microsecond, and 3.4 microsecond, respectively.
KW - SDR
KW - Security Monitor
KW - compromised OS
KW - real-time
KW - security policy
UR - http://www.scopus.com/inward/record.url?scp=85050105276&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050105276&partnerID=8YFLogxK
U2 - 10.1109/ICCNC.2018.8390381
DO - 10.1109/ICCNC.2018.8390381
M3 - Conference contribution
AN - SCOPUS:85050105276
T3 - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
SP - 537
EP - 541
BT - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
T2 - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
Y2 - 5 March 2018 through 8 March 2018
ER -