ABSTRACT
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world's first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables unlicensed (secondary) users in WRANs to utilize licensed spectrum bands on a non-interference basis to incumbent users. The coexistence between incumbent users and secondary users is referred to as incumbent coexistence. On the other hand, the coexistence between secondary users in different WRAN cells is referred to as self-coexistence. The 802.22 draft standard prescribes several mechanisms for addressing incumbent- and self-coexistence issues. In this paper, we describe how adversaries can exploit or undermine such mechanisms to degrade the performance of 802.22 WRANs and increase the likelihood of those networks interfering with incumbent networks. The standard includes a security sublayer to provide subscribers with privacy, authentication, and confidentiality. Our investigation, however, revealed that the security sublayer falls short of addressing all of the key security threats. We also discuss countermeasures that may be able to address those threats.
- J. Bellardo, S. Savage and D. Medina, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", in Proc. of the USENIX Security Symposium, August 2003, pp. 15--27. Google ScholarDigital Library
- T. X. Brown, and A. Sethi, "Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment", Journal of Mobile Networks and Applications Special Issue on Cognitive Radio Oriented Wireless Networks and Communications, Vol. 13(5), October 2008, pp. 516--532. Google ScholarDigital Library
- R. Chen, J.-M. Park, and J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, Vol. 26 (1), January 2008, pp. 25--37. Google ScholarDigital Library
- C. M. Cordeiro, K. Challapali, and D. Birru, "IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios", Journal of communications, Vol. 1(1), April 2006, pp. 38--47.Google ScholarCross Ref
- W. Diffie, and M. E. Hellman, "New Directions in Cryptography", IEEE Transsactions on Infomation Theory, Vol IT-22(6), Nov. 1976, pp. 644--654.Google ScholarDigital Library
- J. R. Douceur, "The Sybil Attack", in Proc. of the First International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002, pp. 251--260. Google ScholarDigital Library
- D. Grandblaise and W. Hu, "Inter Base Stations Adaptive On Demand Channel Contention for IEEE 802.22 WRAN Self Coexistence", IEEE docs: IEEE 802.22-07/0024r0, Januarary 2007.Google Scholar
- V. Gupta, S. Krishnamurthy and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks", in Proc. of IEEE Military Communications Conference (MILCOM '02), 2002, pp. 1118--1123.Google ScholarCross Ref
- A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A Survey of Key Management in Ad Hoc Networks", IEEE Communications Surveys & Tutorials, the 3rd Qtr. 2006, Vol. 8(3), pp. 48--66. Google ScholarDigital Library
- S. Huang, X. Liu, and Z. Ding, "Opportunistic Spectrum Access in Cognitive Radio Networks", in Proc. of IEEE INFOCOM 2008, April 2008.Google ScholarCross Ref
- IEEE 802.16 Task Group E, "Amendment to IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems---Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands", IEEE Standard 802.16e-2005, IEEE Press, 2005.Google Scholar
- IEEE 802.22 WG, "ETRI FT Philips Samsung Proposal", IEEE docs: 22-06-0005-01-0000, January 2006.Google Scholar
- IEEE 802.22 WG, "IEEE P802.22/D0.1 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands", IEEE docs: 22-06-0067-00-0000_P802-22_D0.1, May 2006.Google Scholar
- IEEE 802.22 WG, "Reviews of Channel Model", IEEE docs: 22-05-0070-00-0000, August 2005.Google Scholar
- IEEE Standard for Wireless LAN-Medium Access Control and Physical Layer Specification, 802.11, 1999.Google Scholar
- D. Johnston and J. Walker, "Mutual Authorization for PKMv2", IEEE C802.16e-04/229, 2004.Google Scholar
- D. Johnston and J. Walker, "Overview of IEEE 802.16 Security", IEEE Security & Privacy, Vol. 2(3), May 2004, pp. 40--48. Google ScholarDigital Library
- P. Kyasanur and N. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks", IEEE Transaction on Mobile Computing, Vol. 4(5), September-October 2005, pp. 502--516. Google ScholarDigital Library
- H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks", IEEE/ACM Transaction on Networking, Vol. 12(6), pp. 1049--1063, December 2004. Google ScholarDigital Library
- A. N. Mody, R. Reddy, M. J. Sherman, T. Kiernan, and DJ Shyy, "Security and the Protocol Reference Model Enhancements in IEEE 802.22", IEEE doc: 802.22-08/0083r04, June 2008.Google Scholar
- J. Notor, "The Evolution of Spectrum Sharing in the IEEE 802.22 WRAN Standards Process", February 2006, Available at: http://www.eecs.berkeley.edu/~dtse/3r_otherpapers.htmlGoogle Scholar
- P. Pawelczak, "Protocol Requirements for Cognitive Radio Networks", Technical Report, July 2005. Available at: https://doc.freeband.nl/dscgi/ds.py/Get/File-60831Google Scholar
- S. Radosavac, J. S. Baras and I. Koutsopoulos, "A Framework for MAC Protocol Misbehavior Detection in Wireless Networks", in Proc. of the 4th ACM workshop on Wireless security (Wise '05), 2005, pp. 33--42. Google ScholarDigital Library
- T. S. Rappaport, Wireless Communications: Principles and Practice. Upper Saddle River, NJ: Prentice Hall, 2001. Google ScholarDigital Library
- M. Raya, J. P. Hubaux and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots", in Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys '04), June 2004, pp. 84--97. Google ScholarDigital Library
- S. J. Shellhammer, S. Shankar N, R. Tandra, and J. Tomcik, "Performance of Power Detector Sensors of DTV Signals in IEEE 802.22 WRANs", in Proc. of the first international workshop on Technology and policy for accessing spectrum (TAPAS'06), 2006. Google ScholarDigital Library
- H. Urkowitz, "Energy Detection of Unknown Deterministic Signals", in Proc. of IEEE, April 1967, pp. 523--531.Google Scholar
- L. Zhou and Z. Haas, "Securing Ad Hoc Networks", IEEE Network, Vol. 13(6), 1999, pp. 24--30. Google ScholarDigital Library
Index Terms
- Security vulnerabilities in IEEE 802.22
Recommendations
A Highly Successful Frame Contention Strategy for Self-Coexistence in IEEE 802.22 Wireless Regional Area Networks
As the first standard for cognitive radio networks, IEEE 802.22 wireless regional area networks (WRANs) exploit television white spaces. Secondary networks have to preserve primary network communications and to coexist with other secondary networks. To ...
Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs
TAPAS '06: Proceedings of the first international workshop on Technology and policy for accessing spectrumSensing is the most important component in any cognitive radio system. The IEEE 802.22 Working Group (WG) is formulating the first worldwide standard for cognitive radios to operate in the television (TV) bands. In order for this standard to succeed, it ...
In-Band Spectrum Sensing in IEEE 802.22 WRANs for Incumbent Protection
In cognitive radios, in-band spectrum sensing is essential for the protection of legacy spectrum users, enabling secondary users to vacate channels immediately upon detection of primary users. For in-band sensing, it is important to meet detectability ...
Comments