In order to address the above-mentioned need, a method and apparatus for detecting and reducing fraudulent synchronization bursts is provided herein. During operation of a secondary communication system, a random back off for future sync bursts will be executed following the detection of an unauthenticated beacon. More particularly, a cognitive radio acts on every sync burst received, until acting on one results in the reception of no beacon or an unauthenticated beacon. The cognitive radio then begins a random back off procedure, in which it must receive a random number of sync bursts before it will schedule time to receive a beacon. In a first embodiment of the present invention an exponential back off is utilized. For each unauthenticated beacon received, the back off is incremented, thereby increasing the number of sync bursts that must be received before it will schedule time to receive a beacon again.
While the malevolent sync burst transmitter will have initial success in interrupting the cognitive radio, his effect will quickly be reduced to a nuisance level by the effect of the exponential back off. Further, since the malevolent sync burst transmitter will be unable to predict how many sync bursts will be needed at any time to influence the cognitive radio (due to the random nature of the back off), he must transmit sync bursts continuously even to ensure that he will produce a nuisance.
The present invention encompasses a method for detecting and acting upon a fraudulent synchronization burst. The method comprises the steps of receiving a synchronization burst advertising a time period when a beacon may be received, determining that the synchronization burst was fraudulent, and initiating a procedure wherein a number of synchronization bursts must be received before scheduling a time to receive the beacon.
The present invention additionally encompasses a method comprising the steps of receiving a synchronization burst advertising a time period when a beacon may be received, determining that a counter (C) has expired, listening for the beacon only when the counter has expired, and determining if the synchronization burst was fraudulent. The counter is incremented when the synchronization burst was fraudulent, otherwise the counter is decremented.
The present invention additionally encompasses a method comprising the steps of listening for a synchronization burst advertising a time period when a beacon may be received, wherein the step of listening only takes place when a counter (C) has expired, receiving the synchronization burst advertising a time period when a beacon may be received, listening for the beacon, and determining if the synchronization burst was fraudulent. The counter is incremented when the synchronization burst was fraudulent, otherwise the counter is decremented.
The present invention encompasses an apparatus comprising a receiver receiving a synchronization burst advertising a time period when a beacon may be received and logic circuitry determining that the synchronization burst was fraudulent and initiating a procedure wherein a number of synchronization bursts must be received before scheduling a time to receive the beacon.
Turning now to the drawings, wherein like numerals designate like components,
Circular objects, or nodes 104 (only one labeled) represent wireless devices that operate as part of a secondary communication system, and utilize spectrum assigned to a primary communication system using an opportunistic approach. With this approach, secondary nodes 104 will share the spectrum with primary nodes 105 as well as those operating under authorization on a secondary basis.
It should be noted that although
Rectangular object, 105 represents a wireless device that transmits a beacon. Particularly, object 105 will transmit a series of short “synchronization bursts” identifying a time when a beacon is to be sent, and preferably transmit a beacon at the appropriate time period. As discussed above, the synchronization bursts have no cryptographic protection, and thus can be spoofed. A denial-of-service security hole therefore exists in which a user may send false synchronization bursts, leading the cognitive radio to monitor the channel for false beacons, or beacons that are never sent.
In order to address this issue, cognitive radios 104 will receive a synchronization burst advertising a time period when a beacon may be received, and then make a determination if any synchronization burst was fraudulent. If a fraudulent synchronization burst is detected by any radio 104, the radio 104 will initiate a random back off procedure, in which it must receive a number of sync bursts before it will schedule time to receive a beacon. A synchronization burst is determined to be fraudulent when either no beacon is received at the appropriate time, or an unauthenticated beacon is received. Thus, after the beacon is received, the determination that the synchronization burst is fraudulent will be based on the failure to authenticate the beacon. In a similar manner, after failing to receive the beacon at the appropriate time, the determination that the synchronization burst is fraudulent is based on the failure to receive the beacon.
For each unauthenticated beacon received, the back off exponent is incremented, thereby increasing the number of sync bursts that must be received before it will schedule time to receive a beacon again.
The logic flow begins at step 301 where logic circuitry 203 initializes a variable (BE) to zero, where the counter C is a random integer between 0 and 2BE (i.e., C=rand(2BE)). At step 303 receiver 202 listens for synchronization bursts and at step 305, logic circuitry 203 determines if a synchronization burst was detected. If, at step 305, it has been determined that a synchronization burst has been detected, the logic flow continues to step 309, otherwise the logic flow continues to step 307. At step 307 the value of BE is adjusted, following a policy, and a new value for counter C is determined. The policy at step 307 may decrement BE by 1(i.e., BE=BE−1) every time step 307 is reached, or it may be more sophisticated; e.g., it may require that the value of BE be decremented only after a predetermined number of synchronization bursts have been missed. The logic flow then returns to step 303.
At step 309 logic circuitry 203 decrements the counter by 1 and at step 311 logic circuitry 203 determines if counter C has expired (C=0). If C=0, logic circuitry 203 instructs receiver 202 to listen for the beacon (step 313); otherwise, the logic flow returns to step 303. At step 317 logic circuitry 203 determines if a valid beacon was received. As discussed, an invalid beacon will be assumed for either an un-received beacon, or a beacon that was not properly authenticated. Thus, at step 317 logic circuitry 203 will attempt to authenticate any received beacon.
If a valid beacon was received, logic circuitry 203 performs a valid beacon detection process (step 315). More particularly, logic circuitry 203 processes the information contained in the beacon, and takes action to avoid interference to the services protected by the beacon.
Continuing, if at step 317, logic circuitry 203 determines that a valid beacon was not received (and hence the synchronization burst was fraudulent); at step 319 logic circuitry 203 follows a predetermined policy. The policy at step 319 may increment BE by 1 (i.e., BE=BE+1) each time a valid synchronization burst was not received, and select a new random integer value for counter C between 0 and 2BE. It may also be more sophisticated, and require a predetermined number of invalid beacons to be received before it increments BE, or have different policies for un-received beacons and beacons that were received but not properly authenticated. In yet a further embodiment of the present invention, every time an invalid synchronization burst is detected, logic circuitry 203 increases counter C, and thus increasing the number of synchronization bursts that must be received before scheduling a time to receive the beacon. The logic flow then returns to step 303.
If, at step 407, a synchronization burst is detected, then the logic flow continues to step 411 where receiver 202 listens for the beacon at the appropriate time period. A determination is made as to whether a valid beacon was detected (step 415). As discussed, an invalid beacon comprises either no beacon, or an un-authenticated beacon. If a valid beacon was detected logic circuitry 203 performs a valid beacon detection process (step 315). However, if a valid beacon was not detected, at step 417 logic circuitry 203 follows a predetermined policy. The policy at step 417 may increment BE by 1 (i.e., BE=BE+1) each time a valid beacon was not received. It may also be more sophisticated, and require a predetermined number of invalid beacons to be received before it increments BE, or have different policies for un-received beacons and beacons that were received but not properly authenticated. In yet a further embodiment of the present invention, every time an invalid synchronization burst is detected, logic circuitry 203 increases counter C, and thus increasing the time between attempts to detect the synchronization burst and beacon. The logic flow returns to step 403.
In one embodiment of the present invention, at steps 319 and 417 the value of BE is incremented only up to a maximum value maxBE. When BE=maxBE, BE is no longer incremented at steps 319 and 417. Without this maximum, a determined attacker could force BE to such large values that substantially no beacons would be received, effectively disabling the channel monitoring capability of cognitive radios 104. Note that in step 319 a new value of C is selected regardless of the value of BE.
While the invention has been particularly shown and described with reference to a particular embodiment, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention. It is intended that such changes come within the scope of the following claims.
Number | Date | Country | |
---|---|---|---|
60825728 | Sep 2006 | US |