Recently the huge development of different and heterogeneous wireless communication systems raises the problem of growing spectrum scarcity. Cognitive radio tends to solve this problem by dynamically utilizing the spectrum. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to conventional wireless network. These weaknesses are introduced by the nature itself of cognitive radio, and they may cause serious impact to the network quality of service. However, to the authors' knowledge, there are no specific secure protocols for cognitive radio networks. This paper will discuss the vulnerabilities inherent to cognitive radio systems, identify novel types of abuse, classify attacks, and analyze their impact. Security solutions to mitigate such threats will be proposed and discussed. In particular, physical payer security will be taken into account. A new modulation technique, able to encrypt the radio signal without any a priori common secret between the two nodes, was previously proposed by the authors (Mucchi et al. 2009, WPC 51, 67-80; Mucchi et al. 2010, WPC 53, 329-347). The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. This contribution improves the previous works by proposing the noise loop modulation as physical layer security technique for cognitive radio networks.

Physical layer cryptography and cognitive networks / L. Mucchi; L. S. Ronga; E. Del Re. - In: WIRELESS PERSONAL COMMUNICATIONS. - ISSN 0929-6212. - STAMPA. - 58:(2011), pp. 95-109. [10.1007/s11277-011-0290-y]

Physical layer cryptography and cognitive networks

MUCCHI, LORENZO;RONGA, LUCA SIMONE;DEL RE, ENRICO
2011

Abstract

Recently the huge development of different and heterogeneous wireless communication systems raises the problem of growing spectrum scarcity. Cognitive radio tends to solve this problem by dynamically utilizing the spectrum. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to conventional wireless network. These weaknesses are introduced by the nature itself of cognitive radio, and they may cause serious impact to the network quality of service. However, to the authors' knowledge, there are no specific secure protocols for cognitive radio networks. This paper will discuss the vulnerabilities inherent to cognitive radio systems, identify novel types of abuse, classify attacks, and analyze their impact. Security solutions to mitigate such threats will be proposed and discussed. In particular, physical payer security will be taken into account. A new modulation technique, able to encrypt the radio signal without any a priori common secret between the two nodes, was previously proposed by the authors (Mucchi et al. 2009, WPC 51, 67-80; Mucchi et al. 2010, WPC 53, 329-347). The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. This contribution improves the previous works by proposing the noise loop modulation as physical layer security technique for cognitive radio networks.
2011
58
95
109
L. Mucchi; L. S. Ronga; E. Del Re
File in questo prodotto:
File Dimensione Formato  
art%3A10.1007%2Fs11277-011-0290-y.pdf

Accesso chiuso

Tipologia: Pdf editoriale (Version of record)
Licenza: Tutti i diritti riservati
Dimensione 421.34 kB
Formato Adobe PDF
421.34 kB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/395508
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 21
  • ???jsp.display-item.citation.isi??? 17
social impact