DocumentCode
737588
Title
Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
Author
Borle, Kapil M. ; Biao Chen ; Du, Wenliang Kevin
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume
10
Issue
10
fYear
2015
Firstpage
2225
Lastpage
2235
Abstract
Motivated by the primary user emulation attack in cognitive radios, this paper develops a physical layer user authentication scheme for wireless systems. The developed scheme consists of two stages: 1) one-way hash function for generating authentication tags and 2) physical layer tag embedding via controlled constellation perturbation. A detailed tradeoff analysis is provided that balances the performance of the user authentication for the secondary user and symbol detection for the primary user. In particular, we show that arbitrarily reliable user authentication can be achieved with an almost negligible performance degradation for the primary user under realistic system settings. Experimental results using the GNU Radio/Universal Software Radio Peripheral (USRP) platform are provided to validate the proposed scheme.
Keywords
cognitive radio; telecommunication security; GNU radio/universal software radio peripheral; USRP platform; authentication scheme; cognitive radio; constellation perturbation; generating authentication tags; physical layer spectrum usage authentication; physical layer tag; primary user emulation attack; secondary user detection; symbol detection; wireless systems; Authentication; Degradation; Error probability; Fading; Physical layer; Receivers; Signal to noise ratio; Cognitive radio; GNU Radio; USRP; authentication; cognitive radio; physical layer; primary user emulation attack; security;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2452893
Filename
7150393
Link To Document