SPD-driven Smart Transmission Layer Based On A Software Defined Radio Test Bed Architecture
SPD-driven Smart Transmission Layer Based On A Software Defined Radio Test Bed Architecture
SPD-driven Smart Transmission Layer Based On A Software Defined Radio Test Bed Architecture
net/publication/260868924
CITATIONS READS
10 2,121
3 authors:
Carlo S. Regazzoni
Università degli Studi di Genova
593 PUBLICATIONS 7,816 CITATIONS
SEE PROFILE
All content following this page was uploaded by Kresimir Dabcevic on 30 September 2014.
Keywords: Cognitive Radio, Software Defined Radio, Smart Transmission Layer, Security, Privacy, Dependability,
nSHIELD, Test Bed, SDR, CR, Jamming, Energy Detector Spectrum Sensing.
Abstract: Cognitive Radio as a technological breakthrough and enabler for concepts such as Opportunistic Spectrum
Access and Dynamic Spectrum Access has so far received significant attention from the research community
from a theoretical standpoint. In this work, we build upon the theoretical foundation and present an implemen-
tation of a Software Defined Radio/Cognitive Radio platform, with the feature under particular interest being
the so-called Smart Transmission Layer. Smart Transmission Layer is a feature developed within the currently
ongoing nSHIELD project, whose goal is establishing new paradigms for Security, Privacy and Dependability
(SPD) of the future embedded systems. The role of the SPD-driven Smart Transmission Layer is providing re-
liable and efficient communications in critical channel conditions by using adaptive and flexible algorithms for
dynamically configuring and adapting various transmission-related parameters. The implementation was done
on the test bed consisting of two Secure Wideband Multi-role - Single-Channel Handheld Radios (SWAVE
HH) coupled with the powerful proprietary multi-processor embedded platforms, and the corresponding aux-
iliaries. Several case studies were performed, namely: remote control of the radios, analysis of the installed
waveforms, interference detection, and spectrum sensing using a quasi-real-time energy detector. A roadmap
towards the future implementation aspects using the test bed was set.
5 CASE STUDIES
Figure 7: Implementations of SWAVE HH and the SOC Smart Transmission Layer based on the described test
Power node. bed architecture is currently in its early implemen-
tation phase. However, several basic functionalities
4.3 Assembled test bed have already reached demonstrable level. These will
be described in more details as follows.
Current test bed prototype is composed of two
SWAVE HHs, each interconnected with a Power 5.1 Remote control of the radio
node. A coaxial RF bench was implemented for the
frequency range of interest. Because of the high out- Using Simple Network Management Protocol v3
put power of the radios, two programmable attenua- (SNMP v3), several parameters of the HH radio may
Figure 6: nSHIELD Power node - system architecture.
be externally controlled. For achieving this, SNMP ters that may be TRAPped, with the short description
manager has to be installed and running on the Power of the conditions under which TRAPping messages
node. The host (Power node) and the agents (HHs in are issued.
the network) are connected through an Ethernet hub,
and need to be on the same domain. 5.2 Waveform analysis
By utilizing three basic SNMP commands: GET,
SET and TRAP, it is possible to: read the current As previously stated, there are currently two func-
value of the parameter, set a new value, or issue a tional wavevorms installed on SWAVE HHs: SBW
message/warning if the current value satisfies a con- and VULOS. Having a wideband spectrum analyzer
dition, respectively. allows for monitoring the waveforms and analyzing
The controllable parameters and their correspond- their parameters.
ing features are stored in a Management Information SBW is a wideband multi-hop Mobile Ad-hoc
Base (MIB), which is loaded into the host’s SNMP NETwork (MANET) waveform, supporting operation
manager. MIB table contains all the definitions that in the 225 - 512 MHz part of the UHF band. The
define properties of the controllable parameters, and waveform provides self-(re)configurability and self-
describes each object identifier (OID), which is origi- awareness of the network structure and topology, for
nally a sequence of integers, with a string. up to 50 nodes and up to 5 hops. Furthermore, possi-
The list of the parameters that may be controlled bility of simultaneous streaming of voice and data ser-
externally, with the corresponding input data types, vices is provided, with prioritization for voice stream-
and the SNMP commands that may be invoked is ing (in case of exceeded bandwidth). Allocated chan-
given in Table 1. Since the parameters are self- nel bandwidth is adjustable - up to 5 MHz - with chan-
explanatory, we are omitting a detailed description on nel spacing of up to 2 MHz. SBW uses a fixed digital
them. ManageEngine MibBrowser Free Tool (Man- modulation technique.
ageEngine, 2013) was used as the SNMP manager Self-awareness is exercised by monitoring the net-
running on the power node. work topology for changes every n seconds (monitor
Accordingly, Table 2 provides list of the parame- interval is adjustable). Two Quality of Service (QoS)
Table 1: HH’s Parameters that may be remotely controlled
via SNMP.
Parameter Type SNMP commands
File Transfer Activation string SET/GET
File Transfer Type string SET/GET
FTP User Name string SET/GET
FTP Password string SET/GET
FTP Address string SET/GET
Login Username string SET/GET
Login Password string SET/GET
Transmit Power integer SET/GET
Transmitter On/Off integer SET/GET
Currently Installed Waveform string seq GET
Waveform’s MIB Root string GET
Waveform Status [ON/OFF] integer SET/GET
Audio Message ID string SET/GET
Create New Waveform string SET/GET
Activate Preset string SET/GET
Activate Mission File string SET/GET Figure 10: SBW waveform in the frequency domain - max
Audio Output Gain float SET/GET hold.
Battery Charge Percentage integer GET
File Download Status integer GET
Trap Receiver’s IP Address string SET/GET
Zeroize All Crypto Keys integer SET/GET
log modulation techniques: Amplitude Modulation
Crypto Key Loaded integer GET (AM) and Frequency Modulation (FM), which may
System End Boot [failed/ be configured on-the-fly, alongside with the modula-
succeeded/ in progress] integer GET tion index. Channel bandwidth is adjustable up to 25
kHz, with channel spacing also adjustable up to 25
Table 2: HH’s Parameters that may be TRAPped via SNMP. kHz. Furthermore, the VULOS waveform is able to
Parameter Description utilize both digital and analog voice Coder-Decoders
NET Radio OK The notification is triggered when the visibility
of the radio network is acquired
(CODECs) installed on the radio.
NET Radio FAIL The notification is triggered when the visibility Figure 11 shows envelope shape and properties of
of the radio network is lost
Critical Alarm The notification is triggered when the HH
FM-modulated VULOS waveform with the 25 kHz
has sustained a critical operational error bandwidth, transmitted at 1 dBW in VHF band (30
End Boot The notification is triggered when successful MHz).
boot-up of the HH has been verified
End File Download The trap notifies end of the procedure of file Waveform analysis will have an important SPD
download, indicating whether it was sucessful
Low Power The notification is triggered when the battery
application - by creating a database of waveform
charge falls below a pre-defined limit types that are occurring in the system, it will be pos-
Create Waveform OK The notification is triggered when the sible to identify potentially malicious or misbehaving
waveform is successfully created
Create Waveform FAIL The notification is triggered when the users.
waveform creation has failed
Figure 13: Link quality level vs. interference amplitude for different interfering signals.
REFERENCES Lei, Z. and Chin, F. (2008). A reliable and power efficient
beacon structure for cognitive radio systems. Broad-
Arduino (2013). Arduino uno datasheet. http:// casting, IEEE Transactions on, 54(2):182–187.
arduino.cc/en/Main/arduinoBoardUno. Li, H., Amer, P. D., and Chamberlain, S. C. (1995). Es-
Axell, E., Leus, G., Larsson, E., and Poor, H. (2012). Spec- telle specification of mil-std 188-220 datalink layer -
trum sensing for cognitive radio : State-of-the-art and interoperability standard for digital message transfer
recent advances. Signal Processing Magazine, IEEE, device subsystems. In Proceedings of MILCOM ’95.
29(3):101–116. ManageEngine (2013). Mibbrowser free tool faq.
Beagleboard (2013a). Beagleboard system reference man- http://www.manageengine.com/products/
ual. http://beagleboard.org/static/BBSRM_ mibbrowser-free-tool/faq.html.
latest.pdf. Memsic (2013). Memsic iris datasheet. http:
Beagleboard (2013b). Beagleboard xm system refer- //www.memsic.com/userfiles/files/
ence manual. http://beagleboard.org/static/ Datasheets/WSN/IRIS_Datasheet.pdf.
BBxMSRM_latest.pdf. Minden, G., Evans, J., Searl, L., DePardo, D., Petty, V.,
Beagleboard (2013c). Beaglebone system reference Rajbanshi, R., Newman, T., Chen, Q., Weidling, F.,
manual. http://beagleboard.org/static/ Guffey, J., Datla, D., Barker, B., Peck, M., Cordill, B.,
beaglebone/latest/Docs/Hardware/BONE_SRM. Wyglinski, A., and Agah, A. (2007). Kuar: A flexi-
pdf. ble software-defined radio development platform. In
Cabric, D., Tkachenko, A., and Brodersen, R. W. (2006). New Frontiers in Dynamic Spectrum Access Networks,
Experimental study of spectrum sensing based on en- 2007. DySPAN 2007. 2nd IEEE International Sympo-
ergy detection and network cooperation. In Proceed- sium on, pages 428–439.
ings of the first international workshop on Technology Mitola, J. and Maguire, G.Q., J. (1999). Cognitive ra-
and policy for accessing spectrum, TAPAS ’06, New dio: making software radios more personal. Personal
York, NY, USA. ACM. Communications, IEEE, 6(4):13–18.
Dabcevic, K., Marcenaro, L., and Regazzoni, C. S. (2013). Morerio, P., Dabcevic, K., Marcenaro, L., and Regazzoni,
Security in cognitive radio networks. In T. D. Lagkas, C. (2012). Distributed cognitive radio architecture
P. Sarigiannidis, M. L. and Chatzimisios, P., editors, with automatic frequency switching. In Complexity
Evolution of Cognitive Networks and Self-Adaptive in Engineering (COMPENG), 2012, pages 1–4.
Communication Systems, pages 301–333. IGI Global. nSHIELD Consortium (2012). New shield. http://www.
Esposito, M., Fiaschetti, A., and Flammini, F. (2013). The newshield.eu/.
new shield architectural framework. ERCIM News, Rantos, K., Papanikolaou, A., and Manifavas, C. (2013).
2013(93). Ipsec over ieee 802.15.4 for low power and lossy net-
Farrell, R., Sanchez, M., and Corley, G. (2009). Software- works. In Proceedings of the 11th ACM Interna-
defined radio demonstrators: An example and future tional Symposium on Mobility Management and Wire-
trends. Int. J. Digital Multimedia Broadcasting, 2009. less Access, MobiWac ’13, pages 59–64, New York,
Fette, B. A. (2006). Cognitive radio technology. NY, USA. ACM.
Newnes/Elsevier. RaspberryPiFoundation (2013). Raspberry pi home page.
Fiaschetti, A., Suraci, V., and Delli Priscoli, F. (2012). The http://www.raspberrypi.org/.
shield framework: How to control security, privacy SelexES (2013). Swave hh specifica-
and dependability in complex systems. In Complex- tions. http://www.selexelsag.com/
ity in Engineering (COMPENG), 2012, pages 1–4. internet/localization/IPC/media/docs/
Flammini, F., Bologna, S., and Vittorini, V., editors (2011). SWave-Handheld-Radio-v1-2012Selex.pdf.
Computer Safety, Reliability, and Security - 30th In- Tague, P. (2010). Improving anti-jamming capability and
ternational Conference, SAFECOMP 2011, Naples, increasing jamming impact with mobility control. In
Italy, September 19-22, 2011. Proceedings, volume Mobile Adhoc and Sensor Systems (MASS), 2010
6894 of Lecture Notes in Computer Science. Springer. IEEE 7th International Conference on, pages 501–
Fragkiadakis, A., Tragos, E., and Askoxylakis, I. (2013). 506.
A survey on security threats and detection techniques Tkachenko, A., Cabric, D., and Brodersen, R. (2006). Cog-
in cognitive radio networks. Communications Surveys nitive radio experiments using reconfigurable bee2. In
Tutorials, IEEE, 15(1):428–445. Signals, Systems and Computers, 2006. ACSSC ’06.
Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U., and Fortieth Asilomar Conference on, pages 2041–2045.
Arenaza, I. (2012). Reputation-based intrusion detec- ZEDBoard (2013). Zedboard quick start.
tion system for wireless sensor networks. In Complex- http://www.zedboard.org/sites/
ity in Engineering (COMPENG), 2012, pages 1–5. default/files/documentations/
Gurney, D., Buchwald, G., Ecklund, L., Kuffner, S., and GSC-AES-Z7EV-7Z020-G-v1f-press.pdf.
Grosspietsch, J. (2008). Geo-location database tech- Zolertia (2013). Zolertia z1 revc datasheet.
niques for incumbent protection in the tv white space. http://zolertia.sourceforge.net/wiki/
In New Frontiers in Dynamic Spectrum Access Net- images/e/e8/Z1_RevC_Datasheet.pdf.
works, 2008. DySPAN 2008. 3rd IEEE Symposium on,
pages 1–9.