TY - GEN
T1 - ROSTER
T2 - 6th IEEE Conference on Communications and Network Security, CNS 2018
AU - Zhang, Ning
AU - Sun, Wenhai
AU - Lou, Wenjing
AU - Hou, Y. Thomas
AU - Trappe, Wade
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/8/10
Y1 - 2018/8/10
N2 - In cognitive radio network, cognitive radios dynamically reconfigure themselves based on the spectrum opportunity. It is envisioned to be the key of overcoming the spectrum shortage. However, such reconfigurability also amplifies potential harmful interferences from non-compliant radios. In this paper, we propose ROSTER, a radio context attestation protocol for cognitive radio network. The proposed protocol is based on our observation that the compliance of a radio transmission depends on software configuration, radio configuration as well as the location and time of the device, which we call radio context. We believe radio context attestation, which allows the authority to verify the operational integrity of individual cognitive radio, is a fundamental security function for cognitive radio networks. To the best of our knowledge, we are the first to study this important problem. Different from conventional software attestation, ROSTER is designed to handle dynamic configurations in cognitive radios. Furthermore, special considerations are given in the protocol design to accommodate different levels of sensitivity in spectrum databases. Besides protocol design and security analysis, we also build a prototype of the proposed system using Raspberry Pi, USRP, and Amazon AWS. Network simulation using the benchmark measurements from the prototype shows the scalauility of our proposed protocol.
AB - In cognitive radio network, cognitive radios dynamically reconfigure themselves based on the spectrum opportunity. It is envisioned to be the key of overcoming the spectrum shortage. However, such reconfigurability also amplifies potential harmful interferences from non-compliant radios. In this paper, we propose ROSTER, a radio context attestation protocol for cognitive radio network. The proposed protocol is based on our observation that the compliance of a radio transmission depends on software configuration, radio configuration as well as the location and time of the device, which we call radio context. We believe radio context attestation, which allows the authority to verify the operational integrity of individual cognitive radio, is a fundamental security function for cognitive radio networks. To the best of our knowledge, we are the first to study this important problem. Different from conventional software attestation, ROSTER is designed to handle dynamic configurations in cognitive radios. Furthermore, special considerations are given in the protocol design to accommodate different levels of sensitivity in spectrum databases. Besides protocol design and security analysis, we also build a prototype of the proposed system using Raspberry Pi, USRP, and Amazon AWS. Network simulation using the benchmark measurements from the prototype shows the scalauility of our proposed protocol.
UR - https://www.scopus.com/pages/publications/85052574740
U2 - 10.1109/CNS.2018.8433187
DO - 10.1109/CNS.2018.8433187
M3 - Conference contribution
AN - SCOPUS:85052574740
SN - 9781538645864
T3 - 2018 IEEE Conference on Communications and Network Security, CNS 2018
BT - 2018 IEEE Conference on Communications and Network Security, CNS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 30 May 2018 through 1 June 2018
ER -