Investigations of Security Framework for Cognitive Radio Network focused on IEEE 802.22 WRAN

IEEE 802.22 WRAN에 초점을 맞춘 인지무선네트워크 보안프레임워크에 대한 고찰

Kim, Hyun-Sung;Lee, Sung-Woon
김현성;이성운

  • Published : 20090200

Abstract

Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. This paper is mainly focused on investigating the security framework for the convergence, especially on the cognitive radio (CR) networks over IEEE 802.22, which is still at the stage of being developed. CR is a recent concept for maximizing the utilization of the limited radio bandwidth while accommodating the increasing amount of services and applications in the wireless networks. We expect that the paper could help the security researchers to understand the current issues on the CR and furthermore they could forbidden the repeated problems in the standardization processes, which were found the lack of security in the security framework after publishing the standard.

하나나 그 이상의 기술들이 하나의 장치에 결합되는 융합(Convergence)은 최근 들어 IT 분야에 활발히 진행되고 있다. 하지만 융합을 통해 개별적으로 제공되던 기존 서비스에 새로 개발된 기술들이 결합됨으로서 기존에는 존재하지 않았던 새로운 보안 문제들을 야기할 수 있다. 본 논문은 현재 표준화가 진행 중인 IEEE 802.22 상의 인지무선(Cognitive radio)에 초점을 맞춘 기술융합을 위한 새로운 보안 프레임워크에 대한 고찰을 제시하는데 그 목적이 있다. 인지무선은 제한된 무선자원의 사용을 최대화하면서 무선네트워크의 늘어가는 서비스와 응용들을 수용하기 위한 최근 많은 관심을 받고 있는 기술이다. 본 논문을 통하여 보안연구자들이 인지무선 기술에 대한 현재 이슈들을 이해하고 기존의 표준들이 표준화 과정에서 겪었던 표준화가 발표되고 난 후 보안프레임워크의 결함이 발견되는 반복되는 표준화 과정의 문제들을 사전에 예방할 수 있는데 도움이 될 것으로 기대한다.

Keywords

References

  1. A. Jones, Convergence, Information security technical report, Vol. 12, pp. 69-73, 2007. https://doi.org/10.1016/j.istr.2007.04.001
  2. D. Tyson, Security convergence-managing enterprise security risk, Elsevier, 2007.
  3. 고광진, 박창현, 송명선, 엄중선, 유성진, 임선민, 정회윤, 황성현, TV White Spaces에서의 CR 기술 동향, 전자통신동향분석, Vol. 24, No. 3, pp. 91-102, June 2009.
  4. I. F. Akyildiz, W. Y. Lee, M.C. Vuran and S. Mohanty, NeXt Generation / Dynamic Spectrum Access / Cognitive Radio Wireless Networks: A Survey, Computer Networks Journal, Vol. 50, pp. 2127-2159, September 2006. https://doi.org/10.1016/j.comnet.2006.05.001
  5. I. F. Akyildiz, W. Y. Lee, M.C. Vuran and S. Mohanty, A Survey on Spectrum Management in Cognitive Radio Networks, IEEE Communications Magazine, Vol. 46, pp. 40-48, April 2008.
  6. http://grouper.ieee.org/groups/802/22/, IEEE 802 LAN/MAN Standards Committee : 802.22 WG on WRANs (Wireless Regional Area Networks).
  7. IEEE 802.22, Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE P802.22-D1.0, May 2008.
  8. IEEE 802.22, Proposed Resolutions to Comments Related to Security in 802.22 Draft v2, IEEE 802.22-08/0216r0, December 2009.
  9. J. Mitola III and G. Maguire, Cognitive radio: Making software radios more personal, IEEE Pers. Commun., Vol. 6, No. 4, pp. 13-18, August 1999. https://doi.org/10.1109/98.788210
  10. J. Mitola III, Cognitive radio: An integrated agent architecture for software radio architecture, Ph.D. Dissertation, Royal Institute of Technology (KTH), May 2000.
  11. IEEE 802.22, Protocol Reference Model Enhancements, Management Reference Model, Network Reference Model and Remote Management of the CPEs in 802.22, IEEE 802.22-08/0121r1010, November 2008.
  12. D. Johnston and J. Walker, Overview of IEEE 802.16 Security, IEEE Security and Privacy, Vol. 2, No. 3, pp. 40-48, May 2004.
  13. L. Maccari, M. Paoli, and R. Fantacci, Security Analysis of IEEE 802.16, ICC 2007, pp. 1160-1165, June 2007.
  14. N. Xiong, F. Yang, H. Li, J. Park, Y. Dai, and Y. Pan, Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network, Wireless Communications and Mobile Computing, DOI: 10.1002/wcm.872, 2009.
  15. H. Kim, IEEE 802.16/WiMAX security, http://www.ibluemojo.com/contents/IEEE%20802.16%20Security.pdf, 2007.
  16. R. Marin-Lopez, Y. Ohba, F. Perenigues, and A. F. Gomez. Analysis of Handover Key Management schemes under IETF perspective, Computer Standards & Interfaces, DOI:10.1016/j.csi.2009.10.001, 2009.
  17. T. C. Clancy and N. Georgen, Security in Cognitive Radio Networks : Threats and Mitigation, CrownCom 2008, pp. 1-8, May 2008.
  18. J. L. Burbank, Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security, CrownCom 2008, pp. 1-7, May 2008.
  19. P. Kaligineedi, M. Khabbazian and V. K. Bhargava, Secure Cooperative Sensing Techniques for Cognitive Radio Systems, ICC 2008, pp. 3406-3410, May 2008.
  20. K. Bian and J. Park, Security Vulnerabilities in IEEE 802.22, WICON 2008, Article No. 6, November 2008.
  21. IEEE 802.22, Privacy concerns, IEEE 802.22-09/0114, July 2009.