Documente Academic
Documente Profesional
Documente Cultură
)
Mean
Standard
Deviation
Variance Mean Standard
Deviation
Variance
d1 -0.002 0.144 0.144 -0.002 0.086 0.086
d2 0.009 0.291 0.291 -0.017 0.268 0.268
d3 -0.009 3.139 3.138 0.155 2.756 2.756
d4 0.024 81.541 81.540 0.031 73.312 73.312
d5 0.009 622.731 622.673 3.362 570.042 569.991
a5 2.351 42.469 40.799 -5.458 42.121 40.489
Figure 16. modulation-erased of machine2
Figure 17. modulation-erased of machine2
Authorized licensed use limited to: UNIV OF ENGINEERING AND TECHNOLOGY LAHORE. Downloaded on June 12,2010 at 16:52:13 UTC from IEEE Xplore. Restrictions apply.
Figure 18. The noisy carrier of the second IF output of machine2
Figure 19. modulation-erased of machine1 (higher frequency resolution)
single-frequency carrier at 1M in Exp2. As shown in Figure17
and Figure18, their main lobe and surroundings are similar,
which proves that this method can be used to erase modulation
and extract the noisy carrier.Figure19 is the result of BPSK
modulation-erased signal for machine1, it can be seen that the
surroundings of the main lobe are significant different
compared with those in Figure17. It further proves that phase
noise of the local oscillators from two machines has different
fingerprints.
IV. CONCLUSIONS AND FUTURE WORKS
In this paper, we proposed a new method to defense the
PUE attack in the cognitive radio networks. We identify the
transmitter according to uniqueness feature of the phase noise
of Local Oscillator, in order to distinguish the legitimate
primary users from the emulated ones. In the experiments, we
use one transmitter and two receivers with same LOs. The
results prove that the phase noise of the LO in the two
receivers are different. It indicates that this method is feasible
for transmitter identification and PUE attack defense. In the
future work, we will remove the LO from the receiver and use
the signal generator with low phase noise to replace it. Our
goal is to use a number of 802.11b transmitters, extract their
phase noises and then do transmitter identification to defend
PUE attack. Further, wavelet and high-order statistical
analysis can be applied to improve the efficiency for
transmitter verification.
REFERENCES
[1] S. Capkun, M. Cagalj, and M. Srivastava, Secure localization with
hidden and mobile base stations, IEEE Infocom 2006.
[2] S. Haykin, Cognitive radio: brain-empowered wireless
communications, IEEE Journal on Selected Areas in Communications,
Vol 23 (2), Feb. 2005, pp.201-220.
[3] Federal Communication Commission, Notice for Proposed
Rulemaking (NPRM 03-322): Facilitating Opportunities for Flexible
Efficient, and Reliable Spectrum Use Employing Cognitive Radio
Technologies, ET Docket, No.03-108, Dec.2003.
[4] Ruiliang Chen and Jung-Min Park, Ensuring Trustworthy Spectrum
Sensing in Cognitive Radio Networks, Networking Technologies for
Software Defined Radio Networks, 2006. SDR 06.1
st
IEEE Workshop
on 25-27 Sept. 2006 Pages(s):110-119.
[5] Howard C. Choe, Clark E. Poole, Andrea M. Yu and Harold H. Szu,
Novel identification of intercepted signals from unknown radio
transmitters (have not published).
Authorized licensed use limited to: UNIV OF ENGINEERING AND TECHNOLOGY LAHORE. Downloaded on June 12,2010 at 16:52:13 UTC from IEEE Xplore. Restrictions apply.