Signal fingerprinting in cognitive wireless networks
Title | Signal fingerprinting in cognitive wireless networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Soderi, S., Dainelli, G., Iinatti, J., Hamalainen, M. |
Conference Name | Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), 2014 9th International Conference on |
Date Published | June |
ISBN Number | 978-1-6319-0003-7 |
Keywords | active radiofrequency fingerprinting, Amplitude shift keying, Cognitive, Cognitive radio, cognitive radio manager framework, cognitive wireless networks, common-control-channel information, CRM, cryptographic protocols, Demodulation, denial-of-service attacks, DoS, Fingerprinting, malicious attacks, Protocols, Public key, public key cryptography, RFF, security, signal fingerprinting, Signal to noise ratio, spread spectrum communication, telecommunication security, telecommunication signalling, Wireless, Wireless communication, wireless mesh networks |
Abstract | Future wireless communications are made up of different wireless technologies. In such a scenario, cognitive and cooperative principles create a promising framework for the interaction of these systems. The opportunistic behavior of cognitive radio (CR) provides an efficient use of radio spectrum and makes wireless network setup easier. However more and more frequently, CR features are exploited by malicious attacks, e.g., denial-of-service (DoS). This paper introduces active radio frequency fingerprinting (RFF) with double application scenario. CRs could encapsulate common-control-channel (CCC) information in an existing channel using active RFF and avoiding any additional or dedicated link. On the other hand, a node inside a network could use the same technique to exchange a public key during the setup of secure communication. Results indicate how the active RFF aims to a valuable technique for cognitive radio manager (CRM) framework facilitating data exchange between CRs without any dedicated channel or additional radio resource. |
URL | http://ieeexplore.ieee.org/document/6849697/ |
DOI | 10.4108/icst.crowncom.2014.255374 |
Citation Key | 6849697 |
- malicious attacks
- wireless mesh networks
- Wireless communication
- wireless
- telecommunication signalling
- telecommunication security
- spread spectrum communication
- Signal to noise ratio
- signal fingerprinting
- security
- RFF
- public key cryptography
- Public key
- Protocols
- active radiofrequency fingerprinting
- Fingerprinting
- DoS
- denial-of-service attacks
- Demodulation
- Cryptographic Protocols
- CRM
- common-control-channel information
- cognitive wireless networks
- cognitive radio manager framework
- cognitive radio
- Cognitive
- Amplitude shift keying