In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ex- posed to physical layer attacks. In particular, we focus on two common at- tacks, namely, spectrum sensing data falsification and eavesdropping. Such attacks can be counteracted by using symmetric key algorithms, which how- ever require a complex key management scheme. In this paper we propose a novel algorithm that significantly reduces the complexity of the management of symmetric link keys by leveraging spectrum sensing data that is available to all nodes. In our algorithm, it is assumed that a primary secret key is pre-distributed to the legitimate SUs, which is needed every number of de- tection cycles. With the aid of the information provided in the primary key, our algorithm manipulates the collected samples so that a segment of the estimated sensing statistic at the two legitimate SUs can be used as a seed to generate a common symmetric link key. The link key is then employed to encrypt the transmitted data. Our algorithm exhibits very good performance in terms of bit mismatch rate (BMR) between two link keys generated at the two legitimate SUs. In addition, our solution is robust against the difference in the received signal to noise ratio between two legitimate SUs thus making it suitable for practical scenarios. Furthermore, our algorithm exploits the decision statistic that SUs use for spectrum sensing, hence, it does require neither extra processing nor extra time, allowing the SUs to quickly and securely tab into empty spectrum slots.

Exploiting Spectrum Sensing Data for Key Management / Badawy, AHMED MOHAMED HABELROMAN B M; Elfoulyb, Tarek; Chiasserini, Carla Fabiana; Khattab, Tamer; Trinchero, Daniele. - In: COMPUTER COMMUNICATIONS. - ISSN 0140-3664. - STAMPA. - 97:(2017), pp. 31-39. [10.1016/j.comcom.2016.10.008]

Exploiting Spectrum Sensing Data for Key Management

BADAWY, AHMED MOHAMED HABELROMAN B M;CHIASSERINI, Carla Fabiana;TRINCHERO, Daniele
2017

Abstract

In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ex- posed to physical layer attacks. In particular, we focus on two common at- tacks, namely, spectrum sensing data falsification and eavesdropping. Such attacks can be counteracted by using symmetric key algorithms, which how- ever require a complex key management scheme. In this paper we propose a novel algorithm that significantly reduces the complexity of the management of symmetric link keys by leveraging spectrum sensing data that is available to all nodes. In our algorithm, it is assumed that a primary secret key is pre-distributed to the legitimate SUs, which is needed every number of de- tection cycles. With the aid of the information provided in the primary key, our algorithm manipulates the collected samples so that a segment of the estimated sensing statistic at the two legitimate SUs can be used as a seed to generate a common symmetric link key. The link key is then employed to encrypt the transmitted data. Our algorithm exhibits very good performance in terms of bit mismatch rate (BMR) between two link keys generated at the two legitimate SUs. In addition, our solution is robust against the difference in the received signal to noise ratio between two legitimate SUs thus making it suitable for practical scenarios. Furthermore, our algorithm exploits the decision statistic that SUs use for spectrum sensing, hence, it does require neither extra processing nor extra time, allowing the SUs to quickly and securely tab into empty spectrum slots.
File in questo prodotto:
File Dimensione Formato  
Spectrum_Sensing_security_after_SECOND_reviewers_comments_elsevier_template-1.pdf

embargo fino al 18/10/2018

Descrizione: Articolo principale
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Creative commons
Dimensione 479.68 kB
Formato Adobe PDF
479.68 kB Adobe PDF Visualizza/Apri
Computer_Communications_2017.pdf

non disponibili

Descrizione: Articolo principale
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 519.23 kB
Formato Adobe PDF
519.23 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11583/2654946
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo