TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes

Similar documents
White Space Security: Securing our Spectral Resources. (Aka: Its going to be hard to understand what s going on in order to secure spectrum )

Jamming Wireless Networks: Attack and Defense Strategies

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Cognitive Radio Platform Technology

Spectrum Detector for Cognitive Radios. Andrew Tolboe

Programmable Wireless Networking Overview

High Performance Cognitive Radio Platform with Integrated Physical & Network Layer Capabilities

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Wireless Network Security Spring 2014

Real-Time Spectrum Management for Wireless Networks

SENDORA: Design of wireless sensor network aided cognitive radio systems

Q. No. BT Level. Question. Domain

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

COGNITIVE RADIO AND DYNAMIC SPECTRUM SHARING

Cognitive Ultra Wideband Radio

OWL and Rules for Cognitive Radio

Spectrum Sharing and Flexible Spectrum Use

SDN Architecture 1.0 Overview. November, 2014

Wireless LAN Consortium OFDM Physical Layer Test Suite v1.6 Report

Spectrum Sensing Brief Overview of the Research at WINLAB

Innovative Science and Technology Publications

A User-Friendly Interface for Rules Composition in Intelligent Environments

Cognitive Radio: Brain-Empowered Wireless Communcations

Evaluating OTDOA Technology for VoLTE E911 Indoors

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

Cooperative Spectrum Sensing in Cognitive Radio

Spectrum & Cognitive Radio Research

PoC #1 On-chip frequency generation

Chapter 1 Basic concepts of wireless data networks (cont d.)

Wireless technologies Test systems

Cognitive Radio: Smart Use of Radio Spectrum

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008

Basic Radio Settings on the WAP371

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

WiMedia Interoperability and Beaconing Protocol

Active RFID System with Wireless Sensor Network for Power

Access Networks (DYSPAN)

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Chapter 6. Agile Transmission Techniques

April 1998 doc:. IEEE /158. IEEE P Wireless LANs. WINForum Sharing Rules Requirements And Goals

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

IE047: TETRA Radio Telecoms System

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

AGENTLESS ARCHITECTURE

Comments of Shared Spectrum Company

doc.: IEEE /081r2, 15/072-r1

Cyber-Physical Systems: Challenges for Systems Engineering

Wireless Network Security Spring 2015

David Grandblaise Voice: +33 (0) Motorola Fax: +33 (0)

A new connectivity model for Cognitive Radio Ad-Hoc Networks: definition and exploiting for routing design

AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS

Zukunft der Netze 9. Fachtagung des ITG-FA 5.2 Stuttgart, 7. Oktober 2010 Cognitive Radio How Much Self-Organization is Viable at Spectrum Level?

Media Independent MAC Enhancements for RF Management of Wireless 802 Networks

ENHANCING THE EFFICACY AND SECURITY OF EMERGING WIRELESS SYSTEMS

Cognitive Radio: Fundamentals and Opportunities

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

On Practical Selective Jamming of Bluetooth Low Energy Advertising

Keysight Technologies P-Series and EPM-P Power Meters for Bluetooth Testing. Technical Overview and Self-Guided Demonstration

Spectrum Agile Radio: Radio Resource Measurements for Opportunistic Spectrum Usage

Cooperative Compressed Sensing for Decentralized Networks

Stanford Center for AI Safety

TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS.

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy

Chapter 10. User Cooperative Communications

DC Core Internet Values discussion paper 2017

ITU Global Symposium for Regulators 2014 Manama, Bahrain, 2 5 June ITU activities related to Dynamic Spectrum Access

Overview. Key Facts. TSP Transmitter. TRANSCOM Cellular Network Measurement

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Radio Equipment Directive (RED) 2014/53/EU

A GENERAL SYSTEM DESIGN & IMPLEMENTATION OF SOFTWARE DEFINED RADIO SYSTEM

Intelligent Adaptation And Cognitive Networking

Lecture 5 October 17, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Synchronization and Beaconing in IEEE s Mesh Networks

Andrea Goldsmith. Stanford University

Wireless Digital Nodes

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Time-Limited Leases For Innovative Radios

NIST Activities in Wireless Coexistence

Ground Systems Department

COGNITIVE RADIO TECHNOLOGY. Chenyuan Wang Instructor: Dr. Lin Cai November 30, 2009

Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation

Adaptive Wireless Networks Using Cognitive Radios as a Building Block

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Huawei response to the Ofcom call for input: Fixed Wireless Spectrum Strategy

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p.

An Agent-based Heterogeneous UAV Simulator Design

To Fragment or Not To Fragment: Viability of NC OFDMA in Multihop Networks. Muhammad Nazmul Islam WINLAB, Rutgers University

Artistic Licence. The DALI Guide. Version 3-1. The DALI Guide

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Wireless Network Security Spring 2016

Transcription:

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes Wade Trappe Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1

Talk Overview Motivation TRIESTE overview Spectrum Law Maker Law/Policy Formalism On-board TRIESTE-TCB Components User request work flow External infrastructure Distributed Spectrum Authority Police agent Conclusions & Future directions 2

Cognitive Radio (CR) Expose the lower-layers of the protocol stack to researchers, developers and the public scan the available spectrum select from a wide range of operating frequencies adjust modulation waveforms perform adaptive resource allocation Inexpensive and widely available cognitive radios: USRP/GnuRadio open source software support Xilinx-based Rice platform WINLAB-GaTech-Lucent cognitive radio platform JTRS Clusters (well, not necessarily widely available ) An ideal platform for abuse since the lowest layers of the wireless protocol stack are accessible to programmers. Can be reprogrammed to violate or bypass locally fair spectrum policies 3

Adversarial Opportunities There are many opportunities for exploitation: 1. Poor programming: 1. CR protocols will be complex, it will be easy to write buggy implementations of etiquettes that do not achieve their goal 2. Runaway software processes 2. Greedy exploitation: 1. Decrease back-off window in an 802.11 (or comparable) implementation 2. Ignore fairness in spectrum etiquette (many co-existence protocols assume honest participants, or honest data) 3. Simply Ignoring Etiquette 1. Primary user returns so-what??? 4. Economic/Game-theoretic Models 1. Standard economic models for spectrum sharing seek to support cooperation but cooperation does not ensure trusted operation! 2. Security is an anti-social topic! 5. Plenty more 4

A Potential Attack: Radio Interference Underlying normal traffic Payload Payload Payload &F*(SDJ ^%^*& CD*(&FG Many jammer models exist A powerful attack model: The reactive jammer Stays quiet when the channel is idle, starts transmitting a radio signal as soon as it senses activity on the channel. Targets the reception of a message What can we do? Develop complicated network defense mechanisms Or Ensure that such behavior can t happen (Effect of a jammer on a network of Chipcon 1100 Radios) 5

TRIESTE (Trusted Radio Infrastructures for Enforcing SpecTrum Etiquettes) Goal: to regulate the future radio environment, ensure trustworthy radio operation How two complementary mechanisms Motivation: Our normal day-to-day society On-board enforcement restricting any violation attempt from accessing the radio: running its own suite of spectrum etiquette protocols behaves according to acceptable communal policies An external monitor infrastructure: Distributed Spectrum Authority (DSA) police agent observes the radio environment DSA will punish CRs if violations are detected. 6

TRIESTE Spectrum Law Maker 7

Spectrum Law Maker Defining the spectrum laws, Laws: restrict the spectrum etiquette policies that are programmed by CR users Example: an entity should not leak energy outside the spectrum it has negotiated Spectrum etiquette policies: defined by individual cognitive radio users, or spectrum owners, and they have to obey the spectrum laws. Example: entity can continuously access the allocated spectrum during a specified time period Disseminating spectrum laws to the DSA and cognitive radios ==> The law should be defined using a formal language, a format that is understandable by the radio device 8

Spectrum Law/Policy Formalism Traditional way: laws/policies are published in a human readable form => interpreted by humans => hard-coded into radio device inefficient, inflexible and non-scale XGPL (XG Policy Language) written in XML (Extensible Markup language) a declarative language based on facts and rules instead of a procedural language Selector Description Policy Rule Opportunity Description Usage Constrain Description Policy Rule Selector Description: used to filter policy rules, for a given situation Opportunity Description Usage Constraint Description Authority Description Region Description Frequency Description Time Description Devise Description 9

Spectrum Law/Policy Formalism example Spectrum access policy: This policy applies to CR devices that are capable of operating in 3.6-3.7GHz; Transmissions shall be contained within 3.6GHz to 3.7GHz Policy Rule Policy name: P Selector Description Opportunity Description Usage Constraint Description Any operation Applies to devices that may operate in 3.6-3.7GHz in the US at any time Emission within frequency band from 3.6GHz ~ 3.7GHz 10

Access Control and Spectrum Law Logics We are proposing that explicit forms of on-board access control be implemented Access control requires logic checking Most basic level are access control lists E.g. Device/Type X is allowed (or not) to perform action Y This is too simple for most CR scenarios In order to allow for more complex scenarios, AC must use policy specifications that allow for complex actions Example: Take/Grant models that allow for (grant) delegation of privileges when a primary user is absent, and (take) privileges when a user returns Policy specifications may need to use multiple information types On-board timers, spectrum sensing, certificates and credentials signed by an authority Formal logic tools can be used to implement CR-AC policies Potential Starting Points: 1. XGPL 2. J. Halpern and R. van der Meyden. A logic for SDSI s linked local name spaces. Journal of Computer Security 9:47 74, 2001. 3. LGI 11

TRIESTE On-board TRIESTE-TCB 12

TRIESTE-TCB What is the TRIESTE-TCB (Trusted Computing Base) A virtual block includes all the hardware and software that enforces universal laws and etiquette policies A controlled gate that users have to go through to access radio (standard tamperproof components desirable) Components: CR processor: programmable by the User; performs request filtering based on user defined spectrum etiquette policies Monitor/Verifier: a Controller which can interpret and enforce any well-formed Law. Verify user s radio access request, monitor the on-board radio activity. Wake up/kill Switch: wakeup : brings the baseband processor out of a deep (low power) sleep. kill : stops the corresponding ongoing radio activities. Update: allows the laws evolve over time, accepts a new law only if it is signed by the regulating authority, 13

User request work flow User request and user s credentials (req, user) =>CR policy processor If (req,user) is valid based on Spectrum etiquette policies, (req, user) => Monitor/Verifier. Otherwise, either modified (req, user) are sent, or no (req) is sent. Monitor/Verifier checks (req, user) against Spectrum access Laws. If (req, user) is valid, issues a privilege token (spec-access-details timestamp hash()) With the valid token, the radio access is granted. 14

TRIESTE External infrastructure 15

External infrastructure Spectrum sensors: monitors the local radio environment How much data to collect and distribute? Distributed Spectrum Authority (DSA) Police agent Collecting radio measurements from cognitive radios & auxiliary spectrum sensors. Discovering the Crime based on the geographically distributed radio measurements Punishing the individual radio device that violate the spectrum law/policy (Authenticated Kill Switch) Localizing the misbehaving device and seizing it. 16

External infrastructure issues Discovering the Crime: radio measurements can be supplied by potentially greedy/rogue users. How to correctly detect violation based on potentially biased data? Identification: identify individuals/crs associated with a crime measure transmitter radio signatures based on unavoidable and random fabrication difference (see Signal Prints and NIST studies) embed hard-to-alter (or mandatory) RF fingerprints within every transmission Punishment policies formalize: XGPL is NOT designed to specify what to do if spectrum abuse is detected Extend XG policy language to include punishment definition. If the punishment rule is selected and activated, then new punishing rules with certain expiration period will be generated based on the level and type of punishment, and be inserted into the existing spectrum polices for certain amount of time. 17

Discussion As Cognitive Radios (CRs) become ubiquitous in the future there will be attempts to misuse the highly open and granular control provided to the radio interface. We proposed a framework TRIESTE to ensure that radio devices are only able to access/use the spectrum in a manner that conforms to their privileges. Two levels of etiquette/law enforcement mechanisms: on-board trusted computing base/module (TCB) an infrastructure external to individual CR There are many sub-problems to be tackled It will take a village! 18

Future work Evaluate the impact of using an initial TRIESTE-TCB on the performance of a CR. Map out the interplay between policies, their interpretations, and their enforcement using onboard mechanisms. Identification mechanisms to recognize CRs. Introducing RF signatures into a CR s transmissions Correctly detect violation based on potentially biased data Specification-based anomaly detection can be slow Integrate localization and identification system, using spectrum sensor readings and the cooperation of neighboring CRs. Access Control and Punishment policy formalization Should require formal logics Implementation What amount of CAs can be implemented on-board? Initial starting point: pretend we have a tamperproof component through a virtual partition (e.g. within Micro-blaze soft-core on the WINLAB-Xilinx Cognitive Radios) 19