Files in this item



application/pdfUIUCDCS-R-2008-2929.pdf (2MB)
(no description provided)PDF


Title:Secure Configuration for Software Defined Radio
Author(s):Myagmar, Suvda
Subject(s):Computer Science
Abstract:This thesis addresses secure configuration of reconfigurable radio systems such as software defined radio. Software defined radio (SDR) supports integration and co- existence of multiple radio access technologies on a general-purpose radio equipment. Its reconfigurable radio capabilities make it an ideal solution for interoperability among heterogeneous wireless communications systems, especially in public safety domain. Because an SDR device is able to switch its operating mode by configuring its baseband software and change its radio parameters such as frequency, output power, and modulation format, it is challenging to ensure that radiated emissions of the radio conform with FCC regulations, and hinders widespread adoption of this technology. For SDR systems to realize their full potential, they must be reconfigurable through automated deployment of SDR components. As the industry is moving toward open architectures, portability and configurability of third party software must be provided. We present a configuration framework that automates configuration of an SDR terminal using third party software components, validates conformance of radio configuration, and attests the configuration to a service provider. For automated configuration, we developed a hierarchical two-phase methodology that supports portable configuration profiles and plug-n-play radio composition. We use a graph mapping model to convert configuration profile into a deployable flowraph of waveform components. We show how capabilities and regulations can be reflected in configuration profiles, and how these profiles can be ported using XML templates. For configuration validation, we present a model for component-based certification of an SDR terminal. Methodologies for verifying certification of downloaded software, checking consistency of configuration, and securing the download channel are used to provide conformance validation for SDR terminal. For configuration attestation, we use trusted computing services to support a trusted configuration platform. We outline a secure boot sequence that allow an SDR terminal to ascertain its current configuration to a remote party in a robust manner.
Issue Date:2008-04
Date Available in IDEALS:2009-04-22

This item appears in the following Collection(s)

Item Statistics