Security vulnerabilities in IEEE 802.22
نویسندگان
چکیده
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world’s first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables unlicensed (secondary) users in WRANs to utilize licensed spectrum bands on a non-interference basis to incumbent users. The coexistence between incumbent users and secondary users is referred to as incumbent coexistence. On the other hand, the coexistence between secondary users in different WRAN cells is referred to as self-coexistence. The 802.22 draft standard prescribes several mechanisms for addressing incumbentand self-coexistence issues. In this paper, we describe how adversaries can exploit or undermine such mechanisms to degrade the performance of 802.22 WRANs and increase the likelihood of those networks interfering with incumbent networks. The standard includes a security sublayer to provide subscribers with privacy, authentication, and confidentiality. Our investigation, however, revealed that the security sublayer falls short of addressing all of the key security threats. We also discuss countermeasures that may be able to address those threats.
منابع مشابه
Location-based authentication protocol for first cognitive radio networking standard
The developing IEEE 802.22 standard will allow broadband access to be provided in sparsely populated areas by using cognitive radio techniques with operations on a non-interfering basis over television broadcast bands. Such non-interfering basis operation will increase the efficiency of utilisation of that spectrum, and provide large economic and societal benefits. However, the security mechani...
متن کاملA Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE 802.22 Wireless Regional Area Networks
The previous and most popular broadband wireless technology i.e. WiMAX which is limited about to 10 miles, there are power and line of sight issues yet to be resolved for a broader coverage area. WiMAX deployment is therefore limited to densely populate metropolitan areas. What about rural and sparsely populated, geographically dispersed regional areas? Here is the upcoming solution for that wh...
متن کاملOn the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based on Jablon’s scheme, namely the first passwordbased key agreement mechanism in ISO/IEC FCD 11770-4 and the scheme BPKAS-SPEKE in IEEE P1363.2 also suffer from one or both of these security vulnerabilities. We further s...
متن کاملOn the security of some password-based key agreement protocols crc.dvi
In this paper we show that three potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based on Jablon’s scheme, namely the first password-based key agreement mechanism in ISO/IEC FCD 11770-4 and the scheme BPKAS-SPEKE in IEEE P1363.2 also suffer from some of these security vulnerabilities. We further show ...
متن کاملCognitive Radio Network: Security Enhancements
Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks are using different frequency bands. So ther...
متن کامل