Digital Signatures for Centralized DSA Networks

C. N. Mathur, K.P. Subbalakshmi
{"title":"Digital Signatures for Centralized DSA Networks","authors":"C. N. Mathur, K.P. Subbalakshmi","doi":"10.1109/CCNC.2007.209","DOIUrl":null,"url":null,"abstract":"Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"81","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 4th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2007.209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 81

Abstract

Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
集中式DSA网络的数字签名
在过去几年中,对无线电资源的需求不断增长,同时由于静态频谱分配技术,这些资源没有得到充分利用。动态频谱接入(DSA)被认为是一种既能满足日益增长的无线电资源需求,又能有效利用频谱的解决方案。具有动态感知频谱和访问未充分利用频段能力的无线电设备称为认知无线电(CR)。CR有两大类用户,主要用户是特定无线电频段的许可用户,次要用户是未许可的用户,他们在认知上操作而不会对主要用户造成有害干扰。在本文中,我们考虑了对集中式DSA网络的拒绝攻击,其中恶意的辅助用户伪装成主用户并有效地关闭对所有其他辅助用户的访问。注意,由于主用户和辅助用户之间的区别,这个问题是CR独有的。我们提出了一种基于公钥加密的主用户识别机制,以防止恶意的辅助用户伪装成主用户。我们证明了所提出的识别机制和相关密钥管理在计算上是轻量级的。我们还讨论了所提出的识别机制的一些优点和局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Utility Constrained Energy Minimization In Aloha Networks Ensuring Cache Freshness in On-Demand Routing Protocols for Mobile Ad Hoc Network: A Cross-layer Framework Fuzzy Logic for Cross-layer Optimization in Cognitive Radio Networks Automated Trustworthiness Management for Database Software Components Combining VoiceXML with CCXML: A Comparative Study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1