SafeDSA: Safeguard dynamic spectrum access against fake secondary users

Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band when it is not used by the licensed primary user. The open nature of the wireless medium means that any secondary user can freely use any given spectrum band. Secondary-user authentication is thus essential to ensure the proper operations of DSA systems. We propose SafeDSA, a novel PHY-based scheme for authenticating secondary users in DSA systems. In SafeDSA, the secondary user embeds his spectrum-use authorization into the cyclic prefix of each physicallayer symbol, which can be detected and authenticated by a verifier. In contrast to previous work, SafeDSA achieves robust and efficient authentication of secondary users with negligible impact on normal data transmissions. We validate the efficacy and efficiency of SafeDSA through detailed MATLAB simulations and USRP experiments. Our results show that SafeDSA can detect fake secondary users with a maximum false-positive rate of 0.091 and a negligible false-negative rate based on USRP experiments.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages304-315
Number of pages12
Volume2015-October
ISBN (Print)9781450338325
DOIs
StatePublished - Oct 12 2015
Event22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 - Denver, United States
Duration: Oct 12 2015Oct 16 2015

Other

Other22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015
CountryUnited States
CityDenver
Period10/12/1510/16/15

Fingerprint

Authentication
Data communication systems
MATLAB
Experiments

Keywords

  • Cyclic prefix
  • Dynamic spectrum access
  • OFDM
  • Secondary user authentication

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this

Jin, X., Sun, J., Zhang, R., & Zhang, Y. (2015). SafeDSA: Safeguard dynamic spectrum access against fake secondary users. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2015-October, pp. 304-315). Association for Computing Machinery. https://doi.org/10.1145/2810103.2813717

SafeDSA : Safeguard dynamic spectrum access against fake secondary users. / Jin, Xiaocong; Sun, Jingchao; Zhang, Rui; Zhang, Yanchao.

Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2015-October Association for Computing Machinery, 2015. p. 304-315.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jin, X, Sun, J, Zhang, R & Zhang, Y 2015, SafeDSA: Safeguard dynamic spectrum access against fake secondary users. in Proceedings of the ACM Conference on Computer and Communications Security. vol. 2015-October, Association for Computing Machinery, pp. 304-315, 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, Denver, United States, 10/12/15. https://doi.org/10.1145/2810103.2813717
Jin X, Sun J, Zhang R, Zhang Y. SafeDSA: Safeguard dynamic spectrum access against fake secondary users. In Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2015-October. Association for Computing Machinery. 2015. p. 304-315 https://doi.org/10.1145/2810103.2813717
Jin, Xiaocong ; Sun, Jingchao ; Zhang, Rui ; Zhang, Yanchao. / SafeDSA : Safeguard dynamic spectrum access against fake secondary users. Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2015-October Association for Computing Machinery, 2015. pp. 304-315
@inproceedings{be0ef6f9dc96472bb7d20305f4004969,
title = "SafeDSA: Safeguard dynamic spectrum access against fake secondary users",
abstract = "Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band when it is not used by the licensed primary user. The open nature of the wireless medium means that any secondary user can freely use any given spectrum band. Secondary-user authentication is thus essential to ensure the proper operations of DSA systems. We propose SafeDSA, a novel PHY-based scheme for authenticating secondary users in DSA systems. In SafeDSA, the secondary user embeds his spectrum-use authorization into the cyclic prefix of each physicallayer symbol, which can be detected and authenticated by a verifier. In contrast to previous work, SafeDSA achieves robust and efficient authentication of secondary users with negligible impact on normal data transmissions. We validate the efficacy and efficiency of SafeDSA through detailed MATLAB simulations and USRP experiments. Our results show that SafeDSA can detect fake secondary users with a maximum false-positive rate of 0.091 and a negligible false-negative rate based on USRP experiments.",
keywords = "Cyclic prefix, Dynamic spectrum access, OFDM, Secondary user authentication",
author = "Xiaocong Jin and Jingchao Sun and Rui Zhang and Yanchao Zhang",
year = "2015",
month = "10",
day = "12",
doi = "10.1145/2810103.2813717",
language = "English (US)",
isbn = "9781450338325",
volume = "2015-October",
pages = "304--315",
booktitle = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",

}

TY - GEN

T1 - SafeDSA

T2 - Safeguard dynamic spectrum access against fake secondary users

AU - Jin, Xiaocong

AU - Sun, Jingchao

AU - Zhang, Rui

AU - Zhang, Yanchao

PY - 2015/10/12

Y1 - 2015/10/12

N2 - Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band when it is not used by the licensed primary user. The open nature of the wireless medium means that any secondary user can freely use any given spectrum band. Secondary-user authentication is thus essential to ensure the proper operations of DSA systems. We propose SafeDSA, a novel PHY-based scheme for authenticating secondary users in DSA systems. In SafeDSA, the secondary user embeds his spectrum-use authorization into the cyclic prefix of each physicallayer symbol, which can be detected and authenticated by a verifier. In contrast to previous work, SafeDSA achieves robust and efficient authentication of secondary users with negligible impact on normal data transmissions. We validate the efficacy and efficiency of SafeDSA through detailed MATLAB simulations and USRP experiments. Our results show that SafeDSA can detect fake secondary users with a maximum false-positive rate of 0.091 and a negligible false-negative rate based on USRP experiments.

AB - Dynamic spectrum access (DSA) is the key to solving worldwide wireless spectrum shortage. In a DSA system, unlicensed secondary users can opportunistically use a spectrum band when it is not used by the licensed primary user. The open nature of the wireless medium means that any secondary user can freely use any given spectrum band. Secondary-user authentication is thus essential to ensure the proper operations of DSA systems. We propose SafeDSA, a novel PHY-based scheme for authenticating secondary users in DSA systems. In SafeDSA, the secondary user embeds his spectrum-use authorization into the cyclic prefix of each physicallayer symbol, which can be detected and authenticated by a verifier. In contrast to previous work, SafeDSA achieves robust and efficient authentication of secondary users with negligible impact on normal data transmissions. We validate the efficacy and efficiency of SafeDSA through detailed MATLAB simulations and USRP experiments. Our results show that SafeDSA can detect fake secondary users with a maximum false-positive rate of 0.091 and a negligible false-negative rate based on USRP experiments.

KW - Cyclic prefix

KW - Dynamic spectrum access

KW - OFDM

KW - Secondary user authentication

UR - http://www.scopus.com/inward/record.url?scp=84954192910&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84954192910&partnerID=8YFLogxK

U2 - 10.1145/2810103.2813717

DO - 10.1145/2810103.2813717

M3 - Conference contribution

AN - SCOPUS:84954192910

SN - 9781450338325

VL - 2015-October

SP - 304

EP - 315

BT - Proceedings of the ACM Conference on Computer and Communications Security

PB - Association for Computing Machinery

ER -