Securing Cognitive Radios with a Policy Enforcer and Secure Inter-component Transport Mechanisms

dc.contributor.authorThakkar, Jatinen
dc.contributor.committeechairPark, Jung-Min Jerryen
dc.contributor.committeememberBuehrer, R. Michaelen
dc.contributor.committeememberShukla, Sandeep K.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:44:52Zen
dc.date.adate2010-09-23en
dc.date.available2014-03-14T20:44:52Zen
dc.date.issued2010-09-03en
dc.date.rdate2010-09-23en
dc.date.sdate2010-09-06en
dc.description.abstractCurrent wireless communications are confronted with two significant problems with regard to spectrum use --- spectrum scarcity and deployment difficulties. It is widely believed that Software Defined Radios (SDRs) and Cognitive Radios (CRs) are the key enabling technologies to address these problems. The reconfigurability of SDRs combined with the decoupling of policies and the platform in policy-based radios poses a new technical problem --- viz, enforcing policy conformance. Each DARPA XG radio is equipped with a set of policy conformance components (PCCs) which are responsible for ensuring that the radio is policy-conformant and does not cause harmful interference. The Policy Reasoner (PR) is the inference component of the PCCs whereas the Policy Enforcer (PE) performs enforcement. DARPA's XG program prescribes the Software Communications Architecture (SCA) as the model for SDR/CR architectures. Distributed processing is a fundamental aspect of the SCA, and it uses the Common Object Resource Broker Architecture (CORBA). It is reasonable to assume that some of the SDRs will be implemented as distributed systems, irrelevant of whether they are SCA compliant devices. It is thus obvious that middleware has to be secured for complete security. This thesis enumerates the requirements of an "ideal" PE. We have described the design and implementation of two possible implementations, which can fulfill some of these requirements. The PE can function similar to a firewall, and be at the very boundary of software and hardware components. The PE can also be implemented as a "man-in-the-middle" between the System Strategy Reasoner and the transmission hardware. We further describe a novel method of providing cache coherency for a cache-based PE. We also perform an in-depth analysis of the security requirements in a distributed implementation of a policy-based radio. To this end, we describe the design and implementation of such a system using CORBA middleware. We identify potential vulnerabilities due to the use of CORBA, and describe countermeasures for them. We compare the performance of transport and security mechanisms of two commercial, off-the-shelf (COTS) Object Request Brokers. We show that the magnitude of performance degradation can be reduced by the use of a cleverly selected combination of transport and security mechanisms.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-09062010-211741en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-09062010-211741/en
dc.identifier.urihttp://hdl.handle.net/10919/34948en
dc.publisherVirginia Techen
dc.relation.haspartThakkar_JS_T_2010.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectPolicy Enforceren
dc.subjectCognitive Radiosen
dc.subjectCORBAen
dc.titleSecuring Cognitive Radios with a Policy Enforcer and Secure Inter-component Transport Mechanismsen
dc.typeThesisen
thesis.degree.disciplineElectrical Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Thakkar_JS_T_2010.pdf
Size:
4.04 MB
Format:
Adobe Portable Document Format

Collections