On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication

被引:13
作者
Jiang, Tingting [1 ,2 ]
Zeng, Huacheng [1 ,2 ]
Yan, Qiben [1 ,2 ]
Lou, Wenjing [1 ,2 ]
Hou, Y. Thomas [1 ,2 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Virginia Tech, Falls Church, VA 22043 USA
基金
美国国家科学基金会;
关键词
Wireless security; authentication; cognitive radio network;
D O I
10.1109/WCL.2012.050112.120059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, an interesting primary transmitter authentication scheme was proposed. The main idea of this scheme is to have the primary transmitter embed cryptographic authentication tag at the physical layer. There are a number of features that make this scheme attractive. In this paper, we investigate the effective coverage areas for the primary and secondary receivers before and after applying this scheme. During the process, we reveal a serious limitation of this scheme, which may prohibit its application in practice.
引用
收藏
页码:324 / 327
页数:4
相关论文
共 6 条
[1]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[2]  
Danev B, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P89
[3]  
Garg V.K., 2007, Wireless communications and networking. The Morgan Kaufmann series in networking, V2007, P47, DOI [10.1016/B978-012373580-5/50037-5, DOI 10.1016/B978-012373580-5/50037-5]
[4]  
Lin S., 2004, Error Control Coding
[5]   Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures [J].
Liu, Yao ;
Ning, Peng ;
Dai, Huaiyu .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :286-301
[6]  
Tan X, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P79