Security Assessment of Wideband Spectrum Sensors

R. Yazicigil, Deepak Gopalan, D. Starobinski
{"title":"Security Assessment of Wideband Spectrum Sensors","authors":"R. Yazicigil, Deepak Gopalan, D. Starobinski","doi":"10.1109/DySPAN.2019.8935821","DOIUrl":null,"url":null,"abstract":"We investigate security vulnerabilities of wideband spectrum sensors to denial of service (DoS) attacks, launched by an adversary with limited power budget. We survey traditional spectrum analysis methods and compressed-sensing (CS) spectrum sensors in terms of their operation principles and system performance metrics. We develop and simulate end-to-end system models of the wideband spectrum sensors to evaluate their detection probabilities and false alarm probabilities in both non-adversarial and adversarial environments. We show that sweeping spectrum scanners are inherently secure against DoS attacks due to their high dynamic range and small instantaneous bandwidth (BW) equal to their resolution bandwidth. Next, we evaluate Nyquist-rate FFT-based spectrum sensors and show that they are only vulnerable to high-power DoS attacks due to their wide instantaneous BW equal to their Span. These traditional spectrum sensors, however, have high energy consumption for wideband RF spectrum sensing either due to their long scan time or high power. Thus, CS spectrum sensors have recently been proposed as an alternative for RF spectrum sensing thanks to their low energy consumption and fast scan time. A major contribution of this paper is to show that CS spectrum sensors are vulnerable to stealthy DoS attacks (i.e., the attacks are hard to detect). For the same attacker power budget, we further show that the attacks become more potent if the adversary uses multiple attack signals with low power rather than a single attack signal with high power. Finally, we discuss possible countermeasures against the attacks.","PeriodicalId":278172,"journal":{"name":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DySPAN.2019.8935821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We investigate security vulnerabilities of wideband spectrum sensors to denial of service (DoS) attacks, launched by an adversary with limited power budget. We survey traditional spectrum analysis methods and compressed-sensing (CS) spectrum sensors in terms of their operation principles and system performance metrics. We develop and simulate end-to-end system models of the wideband spectrum sensors to evaluate their detection probabilities and false alarm probabilities in both non-adversarial and adversarial environments. We show that sweeping spectrum scanners are inherently secure against DoS attacks due to their high dynamic range and small instantaneous bandwidth (BW) equal to their resolution bandwidth. Next, we evaluate Nyquist-rate FFT-based spectrum sensors and show that they are only vulnerable to high-power DoS attacks due to their wide instantaneous BW equal to their Span. These traditional spectrum sensors, however, have high energy consumption for wideband RF spectrum sensing either due to their long scan time or high power. Thus, CS spectrum sensors have recently been proposed as an alternative for RF spectrum sensing thanks to their low energy consumption and fast scan time. A major contribution of this paper is to show that CS spectrum sensors are vulnerable to stealthy DoS attacks (i.e., the attacks are hard to detect). For the same attacker power budget, we further show that the attacks become more potent if the adversary uses multiple attack signals with low power rather than a single attack signal with high power. Finally, we discuss possible countermeasures against the attacks.
宽带频谱传感器的安全评估
我们研究宽带频谱传感器的安全漏洞,以拒绝服务(DoS)攻击,由对手发起有限的电力预算。本文对传统的频谱分析方法和压缩感知(CS)频谱传感器的工作原理和系统性能指标进行了综述。我们开发并模拟了宽带频谱传感器的端到端系统模型,以评估其在非对抗和对抗环境下的检测概率和虚警概率。我们表明,由于扫描频谱扫描器具有高动态范围和与分辨率带宽相等的小瞬时带宽(BW),因此它在抵御DoS攻击方面具有固有的安全性。接下来,我们评估了奈奎斯特速率基于fft的频谱传感器,并表明它们只容易受到高功率DoS攻击,因为它们的瞬时BW等于它们的跨度。然而,这些传统的频谱传感器由于扫描时间长或功率高,在宽带射频频谱检测中具有高能耗。因此,CS频谱传感器由于其低能耗和快速扫描时间,最近被提出作为RF频谱传感的替代方案。本文的一个主要贡献是表明CS频谱传感器容易受到隐蔽的DoS攻击(即,攻击很难被检测到)。对于相同的攻击者功率预算,我们进一步表明,如果对手使用多个低功率攻击信号而不是单个高功率攻击信号,攻击会变得更有效。最后,我们讨论了针对攻击的可能对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信