skip to main content
10.5555/1554126.1554138acmotherconferencesArticle/Chapter ViewAbstractPublication PageswiconConference Proceedingsconference-collections
research-article

Security vulnerabilities in IEEE 802.22

Published:17 November 2008Publication History

ABSTRACT

Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world's first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables unlicensed (secondary) users in WRANs to utilize licensed spectrum bands on a non-interference basis to incumbent users. The coexistence between incumbent users and secondary users is referred to as incumbent coexistence. On the other hand, the coexistence between secondary users in different WRAN cells is referred to as self-coexistence. The 802.22 draft standard prescribes several mechanisms for addressing incumbent- and self-coexistence issues. In this paper, we describe how adversaries can exploit or undermine such mechanisms to degrade the performance of 802.22 WRANs and increase the likelihood of those networks interfering with incumbent networks. The standard includes a security sublayer to provide subscribers with privacy, authentication, and confidentiality. Our investigation, however, revealed that the security sublayer falls short of addressing all of the key security threats. We also discuss countermeasures that may be able to address those threats.

References

  1. J. Bellardo, S. Savage and D. Medina, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", in Proc. of the USENIX Security Symposium, August 2003, pp. 15--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. X. Brown, and A. Sethi, "Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment", Journal of Mobile Networks and Applications Special Issue on Cognitive Radio Oriented Wireless Networks and Communications, Vol. 13(5), October 2008, pp. 516--532. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Chen, J.-M. Park, and J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, Vol. 26 (1), January 2008, pp. 25--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. M. Cordeiro, K. Challapali, and D. Birru, "IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios", Journal of communications, Vol. 1(1), April 2006, pp. 38--47.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Diffie, and M. E. Hellman, "New Directions in Cryptography", IEEE Transsactions on Infomation Theory, Vol IT-22(6), Nov. 1976, pp. 644--654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. R. Douceur, "The Sybil Attack", in Proc. of the First International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002, pp. 251--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Grandblaise and W. Hu, "Inter Base Stations Adaptive On Demand Channel Contention for IEEE 802.22 WRAN Self Coexistence", IEEE docs: IEEE 802.22-07/0024r0, Januarary 2007.Google ScholarGoogle Scholar
  8. V. Gupta, S. Krishnamurthy and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks", in Proc. of IEEE Military Communications Conference (MILCOM '02), 2002, pp. 1118--1123.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A Survey of Key Management in Ad Hoc Networks", IEEE Communications Surveys & Tutorials, the 3rd Qtr. 2006, Vol. 8(3), pp. 48--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Huang, X. Liu, and Z. Ding, "Opportunistic Spectrum Access in Cognitive Radio Networks", in Proc. of IEEE INFOCOM 2008, April 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. IEEE 802.16 Task Group E, "Amendment to IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems---Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands", IEEE Standard 802.16e-2005, IEEE Press, 2005.Google ScholarGoogle Scholar
  12. IEEE 802.22 WG, "ETRI FT Philips Samsung Proposal", IEEE docs: 22-06-0005-01-0000, January 2006.Google ScholarGoogle Scholar
  13. IEEE 802.22 WG, "IEEE P802.22/D0.1 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands", IEEE docs: 22-06-0067-00-0000_P802-22_D0.1, May 2006.Google ScholarGoogle Scholar
  14. IEEE 802.22 WG, "Reviews of Channel Model", IEEE docs: 22-05-0070-00-0000, August 2005.Google ScholarGoogle Scholar
  15. IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification, 802.11, 1999.Google ScholarGoogle Scholar
  16. D. Johnston and J. Walker, "Mutual Authorization for PKMv2", IEEE C802.16e-04/229, 2004.Google ScholarGoogle Scholar
  17. D. Johnston and J. Walker, "Overview of IEEE 802.16 Security", IEEE Security & Privacy, Vol. 2(3), May 2004, pp. 40--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Kyasanur and N. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks", IEEE Transaction on Mobile Computing, Vol. 4(5), September-October 2005, pp. 502--516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks", IEEE/ACM Transaction on Networking, Vol. 12(6), pp. 1049--1063, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. N. Mody, R. Reddy, M. J. Sherman, T. Kiernan, and DJ Shyy, "Security and the Protocol Reference Model Enhancements in IEEE 802.22", IEEE doc: 802.22-08/0083r04, June 2008.Google ScholarGoogle Scholar
  21. J. Notor, "The Evolution of Spectrum Sharing in the IEEE 802.22 WRAN Standards Process", February 2006, Available at: http://www.eecs.berkeley.edu/~dtse/3r_otherpapers.htmlGoogle ScholarGoogle Scholar
  22. P. Pawelczak, "Protocol Requirements for Cognitive Radio Networks", Technical Report, July 2005. Available at: https://doc.freeband.nl/dscgi/ds.py/Get/File-60831Google ScholarGoogle Scholar
  23. S. Radosavac, J. S. Baras and I. Koutsopoulos, "A Framework for MAC Protocol Misbehavior Detection in Wireless Networks", in Proc. of the 4th ACM workshop on Wireless security (Wise '05), 2005, pp. 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. S. Rappaport, Wireless Communications: Principles and Practice. Upper Saddle River, NJ: Prentice Hall, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Raya, J. P. Hubaux and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots", in Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys '04), June 2004, pp. 84--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. J. Shellhammer, S. Shankar N, R. Tandra, and J. Tomcik, "Performance of Power Detector Sensors of DTV Signals in IEEE 802.22 WRANs", in Proc. of the first international workshop on Technology and policy for accessing spectrum (TAPAS'06), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Urkowitz, "Energy Detection of Unknown Deterministic Signals", in Proc. of IEEE, April 1967, pp. 523--531.Google ScholarGoogle Scholar
  28. L. Zhou and Z. Haas, "Securing Ad Hoc Networks", IEEE Network, Vol. 13(6), 1999, pp. 24--30. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security vulnerabilities in IEEE 802.22

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WICON '08: Proceedings of the 4th Annual International Conference on Wireless Internet
        November 2008
        682 pages
        ISBN:9789639799363

        Publisher

        ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

        Brussels, Belgium

        Publication History

        • Published: 17 November 2008

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader