WINLAB Rutgers, The State University of New Jersey - - PowerPoint PPT Presentation

winlab
SMART_READER_LITE
LIVE PREVIEW

WINLAB Rutgers, The State University of New Jersey - - PowerPoint PPT Presentation

Cognitive Radio Networks at Cognitive Radio Networks at WINLAB: Networking and WINLAB: Networking and Security Research Security Research WINLAB Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: Professor Wade


slide-1
SLIDE 1

Cognitive Radio Networks at Cognitive Radio Networks at WINLAB: Networking and WINLAB: Networking and Security Research Security Research

Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: Professor Wade Trappe, Associate Director trappe@winlab.rutgers.edu

WINLAB

slide-2
SLIDE 2

[2]

WINLAB

  • The community is researching new architectures, protocols and algorithms for

robust/secure networks will allow for a 2nd generation “cognitive radio” MANET

– Collaborative PHY for increased resilience at the radio level – Novel MANET architectures and protocols (cross-layer, global control, adaptive) – Innovative approaches to security in MANETs – Cognitive radio technology to enable spectrum agility and adaptation – Protocols for networking of cognitive radios

  • Research backed up by a comprehensive set of laboratory capabilities for realistic

and reproducible evaluations at scale

– Cognitive radio platforms (GNU/URSP, WiNC2R, WARP) – ORBIT radio grid testbed, with upgrade to programmable radios – Outdoor vehicular testing – Integration with wired network testbeds, PlanetLab & VINI

  • Government will be affected by:

– Rapidly evolving technologies with high levels of flexibility – More universal connectivity Is this really a good thing? – New forms of security risks

Where Wireless Research is Heading: Robust, Adaptive and Where Wireless Research is Heading: Robust, Adaptive and Programmable Multi Programmable Multi-

  • Radio Networks

Radio Networks

Research

slide-3
SLIDE 3

[3]

WINLAB

  • Global Control Plane (GCP)

– Common framework for spectrum allocation, PHY/MAC bootstrap, topology discovery, cross-layer routing and security management – Decentralized coordination of protocols across location and layers

  • Data plane

– Dynamically linked spectrum mgmt, PHY, MAC, Network modules and parameters as specified by control plane protocol

  • Logical separation of control & data for flexible design and low overhead

– Minimize contention between control & data (…>>50% overhead in 802.11 networks!)

Control PHY Control MAC

Boot- strap Disco very

PHY MAC Network Transport Application Control Plane Data Plane

Global Control Plane Data Plane

Control Signalling Data Path Establish ment Naming & Addres sing

Radios with Programmable PHY/MAC WiNC2R platform

Adaptive Networks of Cognitive Radios

PHY1/MAC1 PHY2/MAC2 PHY3/MAC3

Protocol Stack with GCP

to the Internet

WINLAB WINLAB “ “CogNet CogNet” ” projects use unique hardware capabilities projects use unique hardware capabilities and software design and software design

Research

slide-4
SLIDE 4

[4]

WINLAB

  • CSCC enables mutual observation between heterogeneous nodes to explicitly

coordinate spectrum usage

  • Exchange of CSCC

messages by an extra narrow-band (low bit- rate) radio

  • Periodically broadcast

self-states to others

  • Coordinate spectrum

usage

Global Control Planes support a Common Spectrum Global Control Planes support a Common Spectrum Coordination Channel (CSCC) for cognitive networks Coordination Channel (CSCC) for cognitive networks

Research

slide-5
SLIDE 5

[5]

WINLAB

  • Global scheduling of routes and MAC

time slots is possible through the Global Control Plane architecture

  • Such scheduling eliminates usual

contention that degrades conventional wireless system designs

  • Allocation algorithm works on both

frequency (FD) and time (TD)

  • Algorithm checks for compatible time

slot and freq at each receiver

  • Allows for more parallel transmissions

(fewer “exposed nodes”) and eliminates packet contention

  • Significant performance improvement
  • ver conventional layered 802.11 +

AODV etc.

  • Requires GCP-type capability for

distribution of control

Comparison of Individual and Aggregate Throughput

200000 400000 600000 800000 1000000 1200000 1400000 flow 1 flow 2 flow 3 flow 4 flow 5 Total Global Scheduling 802.11 Aloha Slot Aloha

CogRadio CogRadio Nets: Integrating routing and MAC layer functions Nets: Integrating routing and MAC layer functions is possible via the Global Control Plane is possible via the Global Control Plane

Research

slide-6
SLIDE 6

[6]

WINLAB

Warp Warp-

  • 5: An AI

5: An AI-

  • based

based “ “Wireless Adaptive Routing Protocol Wireless Adaptive Routing Protocol” ” exploits control exploits control-

  • plane separation for improvement

plane separation for improvement

  • Overview:

– Intended for the (CBMANET) CLAN architecture – Investigated by Brian Russel and Michael Littman in conjunction with WINLAB – Based on machine learning algorithms

  • Design philosophy:

– Routing protocols generally make decisions based on metrics that don’t reflect quality of service objectives – Shortest route may not always be the fastest or best! – Cross-layer factors should be considered:

  • MAC/ PHY level data: SNR, RSS, sym bol

error rate, bit error rate? What about router congestion?

  • WARP-5:

– Distance vector, on-demand routing protocol for ad hoc networks – Time-based routing metric incorporates router congestion level and environmental noise/interference. – Routes around heavily-used routers and noisy links even if the route is longer. – Nodes learn estimated time-to-destination for all neighbors. – Protocol benefits present for both single channel and control-channel architectures

AODV-based Routing: Overload WARP-5 Routing: Automated Balancing

1 2 3 4 5 6 2000 4000 6000 8000 10000 12000 Simulation Trial Runs Total Packets Delivered AODV (1 radio) AODV (Control Plane) Warp-5 (1 radio) Warp-5 (Control Plane)

Research

slide-7
SLIDE 7

[7]

WINLAB

AUSTIN: An Initiative to AUSTIN: An Initiative to A Ass ssu ure re S Software Radios have

  • ftware Radios have

T Trusted rusted In Interactions teractions

  • Goal: to regulate the future radio environment, ensure trustworthy cognitive radio
  • peration (Team: Rutgers, Virginia Tech, UMass)
  • How — two complementary mechanisms

– On-board enforcement – restrict any violation attempt from accessing the radio:

Each CR runs its ow n suite of spectrum etiquette protocols Onboard policy checking verifies actions occur according to “spectrum law s”

– An external monitoring infrastructure:

Distributed Spectrum Authority (DSA) — police agent observes the radio

environm ent

DSA w ill punish CRs if violations are detected via authenticated kill com m ands.

Research

slide-8
SLIDE 8

[8]

WINLAB

AUSTIN involves formalizing security languages for CR AUSTIN involves formalizing security languages for CR regulation and a security management plane regulation and a security management plane

  • AUSTIN will use law-governed interaction (LGI), which is more

powerful than conventional access control in both expressive power and scalability.

– LGI employs locality, which supports decentralization of access control, and scalability for stateful regulation – LGI can achieve global effects over a community because all members of that community are subject to the same law

  • A broad and expressive regulatory language will be designed

– XGPL is a starting point, but does not involve policy enforcement – AUSTIN-XGPL will use a concrete representation of past behaviors to allow a detailed evaluation for regulation. – AUSTIN-XGPL challenges:

  • Make the language support variable degrees of

interoperability betw een federations of CR devices.

  • Make the language pow erful, yet sim ple enough to

m inim ize the risk of a poorly-w ritten/ buggy law

  • AUSTIN Credo: Security must be “designed into” all future CR

devices (e.g. an FCC-imposed requirement)

– All CR devices will have a mandatory trusted computing component that includes a well-architected Security Management Plane (SMP) – RF units immediately partition incoming signals to extract SMP communications and relay these to a trusted module on the CR – AUSTIN-SMP will be driven by associated Security Management Agents (SMA) – Security Message Units (SMUs) will support multiple regulation services via a unified packet format. – AUSTIN-SMP provides an exciting approach to more provably secure protocols, as well as improved network manageability

Research LGI-based Interaction AUSTIN-SMP Architecture

slide-9
SLIDE 9

[9]

WINLAB

Secure software and hardware methods prevent corruption of Secure software and hardware methods prevent corruption of CR software, while the AUSTIN CR software, while the AUSTIN-

  • Controller regulates actions

Controller regulates actions

Ontology Interface Knowledge Database Policy Reasoner Sensorary Data General Radio Interface Radio Platform Policy Controller Rule Sets Regulatory Policies/ Ontologies Requests & Commands

AUSTIN- Controller

Policy Monitor Reasoning Results & Response

Research

  • Ensuring the security of radio software involves

– Ensuring that the radio software components come from authorized entities – Assuring that the download and installation processes are secure – Thwarting the unauthorized modification of the software once it has been installed.

  • Hardware security mechanisms should provide a root-
  • f-trust and thus must be tamper-proof

– Bitstream encryption prevents the configuration from being revealed outside the chip – Unlike ASICS, FPGAs reveal no design information when powered off, forcing the adversary to probe an active die. – AUSTIN will investigate the enforcement of basic

  • perational policies using hardware-layer “interlocks”

that cannot be overridden by software layers. Will require:

  • Analyzing the interfaces and dependencies

betw een hardw are and softw are

  • Selecting the policies to be enforced w ith

hardw are

  • Form al state analysis of the hardw are blocks

responsible for policy enforcem ent

  • A m echanism for securely updating policy

enforcem ent circuits.

  • The AUSTIN-Controller is a policy engine

that receives requests from CR processes, and makes formal decisions on whether to allow requested actions to occur

  • AUSTIN-Controller involves:

– Ontology Interface – Knowledge Database – Policy Reasoner – Policy Controller – Policy Monitor

slide-10
SLIDE 10

[10]

WINLAB

Cognitive radios support new forms of security: Secret Key Cognitive radios support new forms of security: Secret Key Extraction from a Wireless Channel Extraction from a Wireless Channel

  • Use channel reciprocity to build highly correlated

data sets

– Probe the channel in each direction – Estimate channel using recd. probe

  • Eve receives only uncorrelated information as she

is more than λ/2 away

  • Level crossings are used to generate bits
  • Alice and Bob must exchange msgs over public

channel to create identical bits

  • What if channel is not already authenticated?

– Requires additional sophistry to prevent man-in-the-middle attack. – It is possible using the correlated data collected from received probes.

P R O B E P R O B E P R O B E Get channel estimates L

  • c

a t i

  • n

s

  • f

e x c u r s i

  • n

s L

  • c

a t i

  • n

s i n a g r e e m e n t Key Key Positive excursion Negative excursion

slide-11
SLIDE 11

[11]

WINLAB Radio Telepathy Prototyping: Establishing a secret key using Radio Telepathy Prototyping: Establishing a secret key using 802.11a 802.11a

  • 64 Point Channel Impulse Response from

802.11a Preamble

  • Tallest Peak in CIR Extracted
  • STA= Bob, AP =Alice
  • Probing of channel: PROBE request and

PROBE response

  • New PROBE every 110msec