Title :
A framework for secure download for software-defined radio
Author :
Michael, Lachlan B. ; Mihaljevic, Miodrag J. ; Haruya, Shinichiro ; Kohno, Ryuji
Author_Institution :
Sony Comput. Sci. Labs. Inc., Tokyo, Japan
fDate :
7/1/2002 12:00:00 AM
Abstract :
This article proposes a framework for establishing secure download for software-defined radio (SDR) that follows the current recommendations of SDR-related organizations, and can be employed in a variety of SDR architectures. The main goals of the security system are verification of the declared identity of the source that produces the software to be downloaded, control and verification of integrity of the downloaded data, disabling of the ability to run unauthorized software on the software-defined terminal, and secrecy of the transmitted data to prevent problems such as loss of intellectual property contained in the software. The system includes the following parties: manufacturers of the terminal hardware and software; government authorities relevant for SDR and users of SDR terminals. The underlying ideas for system development include employment of four different cryptographic techniques and tamper-resistant hardware. The cryptographic techniques employed are a secret key encryption technique, a public key encryption technique, a technique for cryptographic hashing, and a technique for digital signature. An important feature of the system is that it provides the possibility to exchange cryptographic components in an automatic manner. The proposed system is flexible, highly secure to protect both users and manufacturers, and provides a framework for the secure commercial implementation of SDR
Keywords :
data integrity; industrial property; public key cryptography; radio equipment; security of data; software architecture; telecommunication security; SDR architectures; SDR terminals; cryptographic hashing; cryptographic techniques; digital signature; downloaded data integrity verification; government authorities; identity verification; intellectual property; public key encryption; secret key encryption; secure download; security system; software manufacturers; software-defined radio; software-defined terminal; tamper-resistant hardware; terminal hardware manufacturers; transmitted data secrecy; wireless communications; Computer architecture; Control systems; Data security; Employment; Government; Hardware; Intellectual property; Manufacturing; Propagation losses; Public key cryptography;
Journal_Title :
Communications Magazine, IEEE
DOI :
10.1109/MCOM.2002.1018012