DOI QR코드

DOI QR Code

Transaction Signing-based Authentication Scheme for Secure Distributed Spectrum Sensing in Cognitive Radio Networks

인지 라디오 네트워크의 안전한 분산 스펙트럼 센싱을 위한 트랜잭션 서명기법

  • 김태경 (서울신학대학교 교양학부)
  • Received : 2011.08.17
  • Accepted : 2011.09.03
  • Published : 2011.09.30

Abstract

Cognitive radio (CR) technology is to maximize the spectrum utilization by allocating the unused spectrums to the unlicensed users. This technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel and as a result, it is possible to harness wireless frequency more efficiently. To enhance the accuracy of sensing, RDSS was suggested. It is a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test). However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose a transaction signing-based authentication scheme for secure distributed spectrum sensing to response the forged values. The validity of proposed scheme is provided by BAN logic.

Keywords

References

  1. 김창주, "Cognitive Radio 기술 및 응용," 한국전자과학회지 전자파기술, 제17권, 제2호, 2006년 4월, pp. 3-8.
  2. 김창주, "Cognitive Radio 기술동향," 전자통신동향 분석, 제21권, 제4호, 2006년 8월, pp. 62-69.
  3. J. Mitola III, and G. Q. Maguire, "Cognitive radio: making software radios more personal," IEEE Personal Communications, Vol. 6, No. 4, 1999, pp. 13-18. https://doi.org/10.1109/98.788210
  4. Z. Kostic, and N. Sollenberger, "Performance and implementation of dynamic frequency hopping in limited-bandwidth cellular systems," IEEE Transactions on Wireless Communications, Vol. 1, No. 1, Jan., 2002, pp. 28-36. https://doi.org/10.1109/7693.975442
  5. T. Newman, T. Clancy, "Security threats to cognitive radio signal classifiers," Virginia Tech Wireless Personal Communications Symposium, Blacksburg, Va, USA, June 2009.
  6. T. Clancy, N. Goergen, "Security in cognitive radio networks: threats and mitigation," CrownCom, Singapore, May 2008.
  7. R. Chen, J. M. Park, K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," INFOCOM, Apr. 2008, pp. 1876-1884.
  8. W. Wang, H. Li, Y. Sun, Z. Han, "Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks," EURASIP Journal on Advances in Signal Processing, vol. 2010, Article ID 695750, 2010.
  9. A. W. Min, K. G. Shin, X. Hu, "Attack-tolerant distributed sensing for dynamic spectrum access networks," ICNP, Oct. 2009, pp. 294-303.
  10. 김미희, 추현승, "인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘," 한국인터넷정보학회 논문지, 11권, 6호, 2010. 12.
  11. W. S. Jeon, D. G. Jeong, J. A. Han, G. Ko, M. S. Song, "An efficient quiet period management scheme for cognitive radio systems," IEEE Trans. Wireless Commun., Feb. 2008, vol. 7, no. 2, pp. 505-509. https://doi.org/10.1109/TWC.2008.060867
  12. H. Kim, K. G. Shin, "In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?," ACM international Conference on Mobile Computing and Networking (MobiCom), Sep. 2008, pp. 14-25.
  13. E. Visotsky, S. Kuffher, R. Peterson, "On collaborative detection of TV transmissions in support of dynamic spectrum sharing," IEEE DySPAN, Nov. 2005, pp. 338-345.
  14. A. Ghasemi, E. S. Sousa, "Opportunistic spectrum access in fading channels through collaborative sensing," Journal of Communications, 2007, vol. 2, no. 2, pp. 71-82.
  15. G. Ganesan, Y. Li, "Cooperative spectrum sensing in cognitive radio, part II: multiuser networks," IEEE Transactions on Wireless Communications, 2007, vol. 6, no. 6, pp. 2214-2222. https://doi.org/10.1109/TWC.2007.05776
  16. 임형진, 이정근, 김문성, "안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구," 한국 인터넷정보학회, 9권, 6호, 2008년, pp. 73-79.
  17. 김태경, "디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명 기법에 관한 연구", 디지털산업정보학회, 6권, 3호, 2010. 9.
  18. M. Burrows, M. Abadi, R. Needham: A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February, 1990. https://doi.org/10.1145/77648.77649
  19. W. C. Suski, M. A. Temple, M. J. Mendenhall, R. F. Mills, "Using Spectral Fingerprints to Improve Wireless Network Security," GLOBECOM, Dec. 2008, pp. 1-5.
  20. M. Strasser, C. Popper, S. Capkun, " Efficient uncoordinated FHSS anti-jamming communication," International Symposium on Mobile Ad Hoc Networking and Computing. May 2009, pp. 207-218.
  21. Y. Liu, P. Ning. H. Dai, A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," IEEE INFOCOM, Mar. 2010, pp. 1-9.