FRIDAY, FEBRUARY 11, 2005 by Raquel Hill, Ph.D. Department of Computer Science and the National Center for Supercomputing Applications University of Illinois at Urbana-Champaign
ABSTRACT Software Defined Radio (SDR) is a rapidly evolving technology that is receiving enormous recognition and generating widespread interest. SDR technology implements radio functionality such as modulation/demodulation, signal generation, coding and link-layer protocols in software Implementing such functionality in software creates highly flexible handsets that can be reconfigured to upgrade and adapt equipment to user preferences and regional regulations. Reconfigurability enables the use of the same equipment in different regions as well as the fast introduction of new services into mobile networks without requiring the purchase of new terminals. While the benefits of reconfigurable radios are enormous, the ability to reconfigure radio functionality with software may lead to serious radio security problems such as unauthorized use of application and network services, unauthorized modification of software and malfunctioning radio equipment. For example, to illustrate the latter, software can be introduced into a device that changes its radio frequency (RF) operating characteristics so that it is no longer functions within the regulated constraints (e.g. frequency, power, modulation). Such changes in RF parameters may be used to launch denial of service (DoS) attacks on the hardware or entire wireless network. Current techniques for ensuring that a radio is functioning within authorized parameters are not applicable for SDR equipment because RF parameters that were once fixed in hardware may now be reconfigured during regular operation. Users and service providers who once trusted the function of hardware are now required to trust that software provides the correct functionality , software components have been configured properly, SDR devices are running the appropriate software and that the hard caused by malicious or buggy software can be managed and limited. Dr. Hill will present a framework for establishing a trusted computing base for SDR. This framework uses both software and behavioral attestations to prove that the SDR device is running the appropriate code and that the code is functioning properly. The framework uses software attestations to establish trust between an SDR device and a service provider or between SDR devices that are communicating in an ad-hoc manner. Both software and behavioral attestations are used to establish a failsafe mechanism for SDR devices that are improperly configured or running malfunctioning software. B IOGRAPHICAL INFORMATION Raquel Hill earned B.S. and M.S. degrees in Computer Science from the Georgia Institute of Technology in 1991 and 1993 respectively. From 1993 to 1996, she was a Member of Scientific Staff and Nortel Networks in RTP, North Carolina. In November 2002, she received a Ph.D. in Computer Science from Harvard University. After receiving the Ph.D., she was a Lecturer in the School of Electrical and Computer Engineering at Georgia Tech from November 2002 to August 2003. Her research interests include security for wired and wireless infrastructures, resource allocation protocols, and security requirements and policies. Free and open to the public. *Light refreshments will be served.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.