Abstract
The superior reconfigurability of software defined radio mobile devices has made it the most promising technology on the wireless network and in the communication industry. Despite several advantages, there are still a lot to discuss regarding security, for instance, the radio configuration data download, storage and installation, user's privacy, and cloning. The objective of this paper is to present a fraud-prevention framework for software defined radio mobile devices that enhances overall security through the use of new pieces of hardware, modules, and protocols. The framework offers security monitoring against malicious attacks and viruses, protects sensitive information, creates and protects an identity for the system, employs a secure protocol for radio configuration download, and finally, establishes an anticloning scheme, which besides guaranteeing that no units can be cloned over the air, also elevates the level of difficulty clone units if the attacker has physical access to the mobile device. Even if cloned units exist, the anticloning scheme is able to identify and deny services to those units. Preliminary experiments and proofs that analyze the correctness of the fraud-prevention framework are also presented.
- {1} B. Bing and N. Jayant, "A cellphone for all standards," IEEE Spectr., vol. 39, no. 5, pp. 34-39, 2002. Google ScholarDigital Library
- {2} Software Defined Radio Forum website, http://www. sdrforum.org.Google Scholar
- {3} Java 2 Micro Edition Technology website, http://wireless. java.sun.com/j2me.Google Scholar
- {4} L. B. Michael, M. J. Mihaljevic, S. Haruyama, and R. Kohno, "A framework for secure download for software-defined radio," IEEE Commun. Mag., vol. 40, no. 7, pp. 88-96, 2002. Google ScholarDigital Library
- {5} C. Castelluccia and F. Dupont, A Simple Privacy Extension for Mobile IPv6, The Internet Engineering Task Force, Internet Draft: Draft-Castellucia-MobileIP-Privacy, February 2001.Google Scholar
- {6} A. Escudero, "Location privacy in IPv6-tracking binding updates," in Proc. International Workshop on Interactive Distributed Multimedia Systems and Telecommunication (IDMS '01), Lancaster, UK, September 2001.Google Scholar
- {7} CMS 88 Cellular Mobile TelephoneSystem, EN/LZT 101908, Ericsson.Google Scholar
- {8} Global System for Mobile Communication, "The GSM security technical whitepaper for 2002," http://www. hackcanada.com/blackcrawl/.Google Scholar
- {9} UC Berkeley. Internet Security, Applications, Authentication and Cryptography Group, "GSM cloning," http://www.isaac.cs.berkeley.edu/isaac/gsm.html.Google Scholar
- {10} Overview of the Universal Mobile Telecommunication System. DRAFT, July 2002, http://www.umtsworld.com/ technology/overview.htm.Google Scholar
- {11} M. B. Frederick, "Cellular telephone fraud anit-fraud system," US Patent 5,448,760, September 1995.Google Scholar
- {12} M. S. M. Annoni Notare, F. A. da Silva Cruz, B. Goncalves Riso, and C. B. Westphall, "Wireless communications: security management against clonedcellular phones," in Proc. IEEE Wireless Communications and Networking Conference (WCNC '99), vol. 3, pp. 1412-1416 , New Orleans, La, USA, September 1999.Google Scholar
- {13} The Trusted Computing Group, http://www.trusted-computinggroup. org.Google Scholar
- {14} The TCG PC Specific Implementation Specification, http:// www.trustedcomputinggroup.org/downloads/.Google Scholar
- {15} The RC5 encryption algorithm, http://www.secinf.net/ cryptography/The_RC5_Encryption_Algorithm.html.Google Scholar
- {16} RSA encryption, http://mathworld.wolfram.com/RSA-Encryption. html.Google Scholar
- {17} Federal Communications Commission. Authorization and use of software defined radio: first report and order, September 2001, http://www.fcc.gov/Bureaus/Engineering Technology/Notices/2000/fcc00430.txt.Google Scholar
- {18} Intel, "Intel wireless trusted platform: security for mobile devices," http://www.intel.com/design/pca/application-sprocessors/whitepapers/300868.htm.Google Scholar
- {19} A. Brawerman, D. Blough, and B. Bing, "Securing the download of radio configuration files for software defined radio devices," in Proc. ACM International Workshop on Mobility Management and Wireless Access (MobiWac '04), pp. 98-105, Philadelphia, Pa, USA, September-October 2004. Google Scholar
- {20} US Secret Service Financial Crimes Division, http://www. secretservice.gov/financial_crimes.shtml#Telecommunications.Google Scholar
- {21} A. O. Freier, P. Karlton, and P. C. Kocher, The SSL protocol Version 3.0, http://home.netscape.com/eng/ssl3.Google Scholar
Index Terms
- Towards a fraud-prevention framework for software defined radio mobile devices
Recommendations
A software-defined radio based cognitive radio demonstration over FM band
Recent Advances in Wireless Communications and NetworksIn this paper, we present a software-defined radio (SDR) based cognitive radio (CR) implementation and demonstration over the frequency modulation (FM) band. Using GNU Radio as the software platform and USRP (Universal Software Radio Peripheral) SDR ...
A software-defined radio based cognitive radio demonstration over FM band
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World WirelesslyIn this paper, we present a software defined radio (SDR) based cognitive radio implementation and demonstration. Using GNU Radio and USRP SDR boards, we implement and demonstrate a cognitive radio that detects spectrum holes in the FM band and exploits ...
Comments