Abstracts Computer Science

Add abstract

Want to add your dissertation abstract to this database? It only takes a minute!

Search abstract

Search for abstracts by subject, author or institution

Share this abstract

Securing Cognitive Radios with a Policy Enforcer and Secure Inter-component Transport Mechanisms

by Jatin Thakkar

Institution: Virginia Tech
Department: Electrical and Computer Engineering
Degree:
Year: 2010
Keywords: Policy Enforcer; Cognitive Radios; CORBA
Posted:
Record ID: 1881209
Full text PDF: http://scholar.lib.vt.edu/theses/available/etd-09062010-211741/


Abstract

Current wireless communications are confronted with two significant problems with regard to spectrum use  – spectrum scarcity and deployment difficulties. It is widely believed that Software Defined Radios (SDRs) and Cognitive Radios (CRs) are the key enabling technologies to address these problems. The reconfigurability of SDRs combined with the decoupling of policies and the platform in policy-based radios poses a new technical problem  – viz, enforcing policy conformance. Each DARPA XG radio is equipped with a set of policy conformance components (PCCs) which are responsible for ensuring that the radio is policy-conformant and does not cause harmful interference. The Policy Reasoner (PR) is the inference component of the PCCs whereas the Policy Enforcer (PE) performs enforcement. DARPAâs XG program prescribes the Software Communications Architecture (SCA) as the model for SDR/CR architectures. Distributed processing is a fundamental aspect of the SCA, and it uses the Common Object Resource Broker Architecture (CORBA). It is reasonable to assume that some of the SDRs will be implemented as distributed systems, irrelevant of whether they are SCA compliant devices. It is thus obvious that middleware has to be secured for complete security. This thesis enumerates the requirements of an âidealâ PE. We have described the design and implementation of two possible implementations, which can fulfill some of these requirements. The PE can function similar to a firewall, and be at the very boundary of software and hardware components. The PE can also be implemented as a âman-in-the-middleâ between the System Strategy Reasoner and the transmission hardware. We further describe a novel method of providing cache coherency for a cache-based PE. We also perform an in-depth analysis of the security requirements in a distributed implementation of a policy-based radio. To this end, we describe the design and implementation of such a system using CORBA middleware. We identify potential vulnerabilities due to the use of CORBA, and describe countermeasures for them. We compare the performance of transport and security mechanisms of two commercial, off-the-shelf (COTS) Object Request Brokers. We show that the magnitude of performance degradation can be reduced by the use of a cleverly selected combination of transport and security mechanisms.

Add abstract

Want to add your dissertation abstract to this database? It only takes a minute!

Search abstract

Search for abstracts by subject, author or institution

Share this abstract

Relevant publications

Book cover thumbnail image
Prediction of Upper Body Power of Cross-Country Sk...
by Ozciloglu, Mustafa Mikail
   
Book cover thumbnail image
Bitcoins Mining, Transaction, Security Challenges and Futur...
by Zahid, Muhammad Aslam
   
Book cover thumbnail image
Applying User-Centered Interface Design Methods to...
by Mburu, Lucy Waruguru
   
Book cover thumbnail image
Head-Order Techniques and Other Pragmatics of Lamb...
by Troullinos, Nikos B.
   
Book cover thumbnail image
Visualization of Interface Metaphor for Software An Engineering Approach
by Katre, Dinesh S.
   
Book cover thumbnail image
Indoor Wireless Metering Networks A Collection of Algorithms Enabling Low Power/Low ...
by Altan, Nicola
   
Book cover thumbnail image
Automated Generation of Geometrically-Precise and ...
by Mekni, Mehdi
   
Book cover thumbnail image
A Study on the Tone-Reservation Technique for Peak...
by Butt, Umer Ijaz