Proposal and evaluation of security schemes for software-defined radio

نویسندگان

  • Hiroyuki Shiba
  • Kazuhiro Uehara
  • Katsuhiko Araki
چکیده

~ b s m c t the functions of software-defined radio (SDR) can be changed by changing its software. Therefore, many security problems that have never been seen in the conventional fixed wireless terminals will arise. We assess the security issues of the SDR system by taking the distribution model of SDR terminal software into account. A universal security architecture for the SDR systems is proposed. In the security architecture, security layer 1 , involved with radio regulations, is mandatory regardless of the use. In order to keep security, we propose security schemes that use digital signatures in the distribution chain. Three concrete methods are quantitatively compared and discussed. The proposed method can certify the legitimacy of SDR terminals by detecting tampered software and preventing it from being installed on the hardware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems

– Over the last decade the world of wireless communications has been undergoing some crucial changes, which have brought it at the forefront of international research and development interest, eventually resulting in the advent of a multitude of innovative technologies and associated products such as WiFi, WiMax, 802.20, 802.22, wireless mesh networks and software defined radio. Such a disparat...

متن کامل

A proposal of architectural elements for implementing secure software download service in software defined radio

In order to obtain an appropriate, high level of security, a number of architectural elements for secure downloading of software to a software defined radio (SDR) terminal have been pointed out. They include four different cryptographic techniques and employment of tamper resistant hardware. The cryptographic techniques employed are: (a) a secret key encryption technique; (b) a public key encry...

متن کامل

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003