skip to main content
research-article

Secure reconfiguration of software-defined radio

Published:05 April 2012Publication History
Skip Abstract Section

Abstract

Software-defined radio (SDR) implements a radio system in software that executes on a programmable processor. The components of SDR, such as the filters, amplifiers, and modulators, can be easily reconfigured to adapt to the operating environment and user preferences. However, the flexibility of radio reconfiguration brings along the serious security concern of malicious modification of software in the SDR system, leading to radio malfunction and interference with other users' communications. Both the SDR device and the network need to be protected from such malicious radio reconfiguration.

In this article, a new architecture targeted at protecting SDR devices from malicious reconfiguration is proposed. The architecture is based on robust separation of the radio operation environment and user application environment, through the use of virtualization. A new radio middleware layer is designed to securely intercept all attempts to reconfigure the radio, and a security policy monitor checks the target configuration against security policies that represent the interests of various parties. Even if the operating system in the user application environment is compromised, the proposed architecture can ensure secure reconfiguration in the radio operation environment. We have prototyped the proposed secure SDR architecture using VMware and the GNU Radio toolkit and demonstrate that overheads incurred by the architecture are small and tolerable. Therefore, we believe that the proposed solution could be applied to address secure SDR reconfiguration in both general-purpose and embedded computing systems.

References

  1. Ben-Yehuda, M., Xenidis, J., and Ostrowski, M. 2007. The price of safety: Evaluating IOMMU performance. In Proceedings of the Linux Symposium. Vol. 1, 9--20.Google ScholarGoogle Scholar
  2. Brawerman, A., Blough, D., and Bing, B. 2004. Securing the download of radio configuration files for software defined radio devices. In Proceedings of the International Workshop of Mobility Management and Wireless Access Protocols. 98--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Brawerman, A. and Copeland, J. 2005. An anti-cloning framework for software defined radio mobile devices. In Proceedings of the IEEE International Conference on Communications. Vol. 5.Google ScholarGoogle Scholar
  4. Falk, R., Esfahani, J. F., and Dillinger, M. 2002. Reconfigurable radio terminals—threats and security objectives. Tech. rep. SDRF-02-I-0056.Google ScholarGoogle Scholar
  5. Flanigan, P., Welch, V., and Pant, M. 2005. Dynamic policy enforcement for software defined radio. In Proceedings of the Software Defined Radio Technical Conference and Product Exposition.Google ScholarGoogle Scholar
  6. Halderman, J., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E., and Foundation, E. 2008. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the USENIX Security Symposium. 45--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hill, R., Myagmar, S., and Campbell, R. 2005. Threat analysis of GNU software radio. In Proceedings of the World Wireless Congress.Google ScholarGoogle Scholar
  8. Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. 2006. Antfarm: Tracking processes in a virtual machine environment. In Proceedings of the USENIX Annual Technical Conference. 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kurdziel, M., Beane, J., and Fitton, J. 2005. An SCA security supplement compliant radio architecture. In Proceedings of the IEEE Military Communications Conference. Vol. 4. 2244--2250.Google ScholarGoogle Scholar
  10. Lee, P. SDR Architecture, http://www.sdrforum.org/pages/aboutSdrTech/SDR_Architectures.pdf.Google ScholarGoogle Scholar
  11. Michael, L., Mihaljevic, M., Haruyama, S., and Kohno, R. 2002a. A framework for secure download for software-defined radio. IEEE Comm. Mag. 40, 7, 88--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Michael, L., Mihaljevic, M., Haruyama, S., and Kohno, R. 2002b. A proposal of architectural elements for implementing secure software download service in software defined radio. In Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Vol. 1. 442--446.Google ScholarGoogle Scholar
  13. Mulliner, C. and Miller, C. Fuzzing the phone in your phone, http://www.blackhat.com/presentations/bh-usa-09/miller/bhusa09-miller-fuzzingphone-paper.pdf.Google ScholarGoogle Scholar
  14. Myagmar, S. 2008. Secure configuration for software defined radio. Ph.D. thesis, University of Illinois at Urbana-Champaign. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. 2004. Security in embedded systems: Design challenges. ACM Trans. Embedd. Comput. Syst. 3, 3, 461--491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sakaguchi, K., Fung Lam, C., Doan, T., Togooch, M., Takada, J., and Araki, K. 2003. ACU- and RSM-based radio spectrum management for realization of flexible software defined radio world. IEICE Trans. Comm. E Series B 86, 12, 3417--3424.Google ScholarGoogle Scholar
  17. SDR Forum. 1999. Architecture and elements of SDR systems as related to standards. Tech. rep.Google ScholarGoogle Scholar
  18. SDR Forum. 2002a. Report on issues and activity in the area of security for software defined radio. Tech. rep. SDRF-02-A-0003.Google ScholarGoogle Scholar
  19. SDR Forum. 2002b. SDR system security. Tech. rep. SDRF-02-A-0006.Google ScholarGoogle Scholar
  20. SDR Forum. 2003. A structure for software defined radio security. Tech. rep. SDRF-03-I-0010.Google ScholarGoogle Scholar
  21. SDR Forum. 2004a. Hardware abstraction layer working group report on results of request for information. Tech. rep.Google ScholarGoogle Scholar
  22. SDR Forum. 2004b. SDR wireless security. Tech. rep. SDRF-04-I-0023.Google ScholarGoogle Scholar
  23. SDR Forum. 2005. SDR security requirements. Tech. rep., SDRF-04-W-0006.Google ScholarGoogle Scholar
  24. SDR Forum System Interface Working Group. 2003. API position paper. Tech. rep.Google ScholarGoogle Scholar
  25. Tonmukayakul, A. and Weiss, M. 2004. Secondary use of radio spectrum: A feasibility analysis. In Proceedings of the Telecommunications Policy Research Conference.Google ScholarGoogle Scholar
  26. Uchikawa, H., Umebayashi, K., and Kohn, R. 2002. Secure download system based on software defined radio composed of FPGAs. In Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. 437--441.Google ScholarGoogle Scholar

Index Terms

  1. Secure reconfiguration of software-defined radio

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!