DocumentCode :
737588
Title :
Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
Author :
Borle, Kapil M. ; Biao Chen ; Du, Wenliang Kevin
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume :
10
Issue :
10
fYear :
2015
Firstpage :
2225
Lastpage :
2235
Abstract :
Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.
Keywords :
cognitive radio; telecommunication security; GNU radio/universal software radio peripheral; USRP platform; authentication scheme; cognitive radio; constellation perturbation; generating authentication tags; physical layer spectrum usage authentication; physical layer tag; primary user emulation attack; secondary user detection; symbol detection; wireless systems; Authentication; Degradation; Error probability; Fading; Physical layer; Receivers; Signal to noise ratio; Cognitive radio; GNU Radio; USRP; authentication; cognitive radio; physical layer; primary user emulation attack; security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2452893
Filename :
7150393
Link To Document :
بازگشت