Withdraw
Loading…
Secure Configuration for Software Defined Radio
Myagmar, Suvda
Loading…
Permalink
https://hdl.handle.net/2142/11435
Description
- Title
- Secure Configuration for Software Defined Radio
- Author(s)
- Myagmar, Suvda
- Issue Date
- 2008-04
- Keyword(s)
- computer science
- Abstract
- This thesis addresses secure configuration of reconfigurable radio systems such as software defined radio. Software defined radio (SDR) supports integration and co- existence of multiple radio access technologies on a general-purpose radio equipment. Its reconfigurable radio capabilities make it an ideal solution for interoperability among heterogeneous wireless communications systems, especially in public safety domain. Because an SDR device is able to switch its operating mode by configuring its baseband software and change its radio parameters such as frequency, output power, and modulation format, it is challenging to ensure that radiated emissions of the radio conform with FCC regulations, and hinders widespread adoption of this technology. For SDR systems to realize their full potential, they must be reconfigurable through automated deployment of SDR components. As the industry is moving toward open architectures, portability and configurability of third party software must be provided. We present a configuration framework that automates configuration of an SDR terminal using third party software components, validates conformance of radio configuration, and attests the configuration to a service provider. For automated configuration, we developed a hierarchical two-phase methodology that supports portable configuration profiles and plug-n-play radio composition. We use a graph mapping model to convert configuration profile into a deployable flowraph of waveform components. We show how capabilities and regulations can be reflected in configuration profiles, and how these profiles can be ported using XML templates. For configuration validation, we present a model for component-based certification of an SDR terminal. Methodologies for verifying certification of downloaded software, checking consistency of configuration, and securing the download channel are used to provide conformance validation for SDR terminal. For configuration attestation, we use trusted computing services to support a trusted configuration platform. We outline a secure boot sequence that allow an SDR terminal to ascertain its current configuration to a remote party in a robust manner.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/11435
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…