Visible to the public Signal fingerprinting in cognitive wireless networks

TitleSignal fingerprinting in cognitive wireless networks
Publication TypeConference Paper
Year of Publication2014
AuthorsSoderi, S., Dainelli, G., Iinatti, J., Hamalainen, M.
Conference NameCognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), 2014 9th International Conference on
Date PublishedJune
ISBN Number978-1-6319-0003-7
Keywordsactive radiofrequency fingerprinting, Amplitude shift keying, Cognitive, Cognitive radio, cognitive radio manager framework, cognitive wireless networks, common-control-channel information, CRM, cryptographic protocols, Demodulation, denial-of-service attacks, DoS, Fingerprinting, malicious attacks, Protocols, Public key, public key cryptography, RFF, security, signal fingerprinting, Signal to noise ratio, spread spectrum communication, telecommunication security, telecommunication signalling, Wireless, Wireless communication, wireless mesh networks
Abstract

Future wireless communications are made up of different wireless technologies. In such a scenario, cognitive and cooperative principles create a promising framework for the interaction of these systems. The opportunistic behavior of cognitive radio (CR) provides an efficient use of radio spectrum and makes wireless network setup easier. However more and more frequently, CR features are exploited by malicious attacks, e.g., denial-of-service (DoS). This paper introduces active radio frequency fingerprinting (RFF) with double application scenario. CRs could encapsulate common-control-channel (CCC) information in an existing channel using active RFF and avoiding any additional or dedicated link. On the other hand, a node inside a network could use the same technique to exchange a public key during the setup of secure communication. Results indicate how the active RFF aims to a valuable technique for cognitive radio manager (CRM) framework facilitating data exchange between CRs without any dedicated channel or additional radio resource.

URLhttp://ieeexplore.ieee.org/document/6849697/
DOI10.4108/icst.crowncom.2014.255374
Citation Key6849697