Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios

被引:53
作者
Rehman, Saeed Ur [1 ]
Sowerby, Kevin W. [1 ]
Coghill, Colin [1 ]
机构
[1] Univ Auckland, Dept Elect & Comp Engn, Auckland 1, New Zealand
关键词
cognitive radio; telecommunication security; software radio; low-end CR receivers; inexpensive analogue components; low-end receiver; software-defined radios; primary user emulation attack mitigation; low-end cognitive radios; radiofrequency fingerprinting; NETWORKS; SYSTEMS;
D O I
10.1049/iet-com.2013.0568
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, radio-frequency (RF) fingerprinting has been proposed for mitigating primary user emulation (PUE) attacks in cognitive radio networks (CRNs). The widespread practical implementation of cognitive radio (CR) is likely to utilise software-defined radios with a low-end (i.e. low-cost) receiver built with inexpensive analogue components. This study experimentally analyses the feasibility of RF fingerprinting for mitigating PUE attacks using low-end software-defined CRs. Seven universal software radio peripherals are used as low-end CR receivers and their resulting performance is analysed for ad hoc and infrastructure CRN scenarios. The performance analysis is performed for the largest known data set of its kind, which consists of 490 000 measurements from seven identical transmitters across eight receivers. It is found that impairments in the front-end of a low-end receiver affects the accuracy of transmitter classification and this accuracy varies across receivers. The results suggest that RF fingerprinting can be effectively used for mitigating PUE attacks in an ad hoc CRN at high receiver signal-to-noise ratio whereas RF fingerprinting is not a practical solution for mitigating PUE attacks in an infrastructure CRN.
引用
收藏
页码:1274 / 1284
页数:11
相关论文
共 17 条
  • [1] A survey on spectrum management in cognitive radio networks
    Akyildiz, Ian F.
    Lee, Won-Yeol
    Vuran, Mehmet C.
    Mohanty, Shantidev
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 40 - 48
  • [2] Toward secure distributed spectrum sensing in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Hou, Y. Thomas
    Reed, Jeffrey H.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 50 - 55
  • [3] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [4] Danev B., 2009, ETH, V8, P10, DOI 10.3929/ethz-a-006836297
  • [5] Cognitive radio: Brain-empowered wireless communications
    Haykin, S
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) : 201 - 220
  • [6] Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems-Part II: Unknown Channel Statistics
    Li, Husheng
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (01) : 274 - 283
  • [7] Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics
    Li, Husheng
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) : 3566 - 3577
  • [8] Cognitive Radio as a Mechanism to Manage Front-End Linearity and Dynamic Range
    Marshall, Preston F.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (03) : 81 - 87
  • [9] Identifying Wireless Users via Transmitter Imperfections
    Polak, Adam C.
    Dolatshahi, Sepideh
    Goeckel, Dennis L.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1469 - 1479
  • [10] Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
    Rehman, Saeed Ur
    Sowerby, Kevin W.
    Coghill, Colin
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 591 - 601