TY - GEN
T1 - Towards secure spectrum decision
AU - Jakimoski, G.
AU - Subbalakshmi, K. P.
PY - 2009
Y1 - 2009
N2 - The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistically. The two main constraints in the design of DSA networks is to make sure that this opportunistic access is done without any disruption of service to the primary users and without any modifications to the primaries themselves. Most architectures and protocols for DSA networks in the literature assume that all parties are honest and that there are no attackers. Recently (IEEE ICC, CogNet 2008) we demonstrated the failure of this approach by showing that an attacker can manipulate messages to convince the parties involved in the protocol to make incorrect spectrum decisions. In this paper, we consider spectrum decision protocols in clustered infrastructure-based dynamic spectrum access networks where the spectrum decision in each cluster is coordinated by some central authority. We propose an efficient and provably secure protocol that can be used to protect the spectrum decision process against a malicious adversary.
AB - The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistically. The two main constraints in the design of DSA networks is to make sure that this opportunistic access is done without any disruption of service to the primary users and without any modifications to the primaries themselves. Most architectures and protocols for DSA networks in the literature assume that all parties are honest and that there are no attackers. Recently (IEEE ICC, CogNet 2008) we demonstrated the failure of this approach by showing that an attacker can manipulate messages to convince the parties involved in the protocol to make incorrect spectrum decisions. In this paper, we consider spectrum decision protocols in clustered infrastructure-based dynamic spectrum access networks where the spectrum decision in each cluster is coordinated by some central authority. We propose an efficient and provably secure protocol that can be used to protect the spectrum decision process against a malicious adversary.
KW - Cognitive radio
KW - Dynamic spectrum access
KW - Security
KW - Spectrum decision
UR - http://www.scopus.com/inward/record.url?scp=70449473167&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70449473167&partnerID=8YFLogxK
U2 - 10.1109/ICC.2009.5199536
DO - 10.1109/ICC.2009.5199536
M3 - Conference contribution
AN - SCOPUS:70449473167
SN - 9781424434350
T3 - IEEE International Conference on Communications
BT - Proceedings - 2009 IEEE International Conference on Communications, ICC 2009
T2 - 2009 IEEE International Conference on Communications, ICC 2009
Y2 - 14 June 2009 through 18 June 2009
ER -