37
Cognitive Radio: The Next Decade Secure Geospatial Dynamic Spectrum Access French National Research Center Workshop on Cognitive Radio Paris, France May 2011 May 2011 Dr. Joseph Mitola III, Fellow of the IEEE Distinguished Professor, School of Engineering and Science, Distinguished Professor, School of Systems and Enterprises, and Vice President for the Research Enterprise Stevens Institute of Technology © 2011 Dr. Joseph Mitola III All Rights Reserved

Cognitive Radio: The Next Decade - Supélec Radio: The Next Decade ... (Dr. Mark McHenry) Used with Permission, ... Connecting language and vision using a conceptualPublished in: Atherosclerosis

Embed Size (px)

Citation preview

Cognitive Radio: The Next DecadeSecure Geospatial Dynamic Spectrum Access

French National Research Center Workshop on Cognitive RadioParis, France

May 2011May 2011

Dr. Joseph Mitola III, Fellow of the IEEEDistinguished Professor, School of Engineering and Science,

Distinguished Professor, School of Systems and Enterprises, andVice President for the Research Enterprise

Stevens Institute of Technology© 2011 Dr. Joseph Mitola III All Rights Reserved

Secure Geospatial Dynamic Spectrum Access (Secure Geospatial DSA)

• Abstract The evolution of commercial wireless technologies clearly establishes that subscriber packing density is key to spectrum efficiency. The first step in this process is geospatial - the network operator must know where to place the towers. Similarly, the FCC decision to mandate a geospatial database for US TV whitespace is a good first step. However, interference mitigation also must be achieved for high packing density, e.g. by GSM frequency hopping, CDMA soft handoff, and LTE MIMO: merely knowing radio locations is insufficient for spectrum efficiency. The ideal by GSM frequency hopping, CDMA soft handoff, and LTE MIMO: merely knowing radio locations is insufficient for spectrum efficiency. The ideal cognitive radio was not a simple dynamic spectrum sensor, but first observed space-time-spectrum and user context, then analyzed the situation to react immediately or to plan, decide, act and learn, both as a radio node (Mitola 99) and as a cognitive wireless network (Mahonen et al, Dagstuhl01). Dr Mitola's talk offers support for increasing the degree of computational intelligence in cognitive radio from simple DSA to space-time-RF and user situation awareness with secure networked collaboration and learning for efficient yet fair cognitive radio both for low power ad hoc RF products and for LTE Advanced.

2© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Environment

Cognitive Radio (DSA)Cognition Cycle

Cognition

EnvironmentSpace-TimePropagationNetwork

Meta-Software

Antenna RF Modem

INFOSECBasebandUser Interface

Equalizer Model

Variable Bindings

...

User(s)IdentityNeedsBehaviors ...

Self ModelBehaviorModels

User

Environment

Antenna RF Modem Baseband User Interface

Hardware

INFOSEC

Protocol Stack, ControlModem, Equalizer, etc.

Software RadioSoftware Modules …..

KnownSelf

3© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Mitola Radio XML ⇒⇒⇒⇒ Cognitive Linguistics Behavior Model (CLBM)

BasebandUser InterfaceVariable Bindings

Simon Haykin

Dynamic Spectrum Access

Primary (Licensed) Spectrum

Cordless Telephones: Analog, DECT …

Unlicensed Spectrum (Part 15)

Space-time DynamicsNetwork Management

Overlay: OFDM Water Filling

Measurements © 2006 Shared Spectrum Company, Used with Permission

(DSA)

Cellular 1G 2G CDMA 3GPP

Underlay: Ultra Wide Band (UWB)

Noise Temperature

Cordless Telephones: Analog, DECT …WLAN: 802.11 a/b/b WiFi …WPAN: 802.15, BlueTooth, HomeRF

4© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

MaliciousAgents

US Whitespace MarketsPropelling CR

5

Bian and Park, Addressing The Hidden Incumbent Problem In 802.22 Networks SDR09

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

FCC

Spectrum Management Database

• Location, Radiated Power– Requirement to check the database

– Requirement to prevent harmful interference

– Good Start, But Not Enough– Good Start, But Not Enough

• ATT NOI Response for Policy Radio“The FCC should proceed cautiously with any experimentation with policy radios out of concern for security, including the ability of end-users to hack the device and alter how it responds to policies”

6

Digital Whitespace Simulation

7

© 2011 Jaap van de Beek, Janne Riihij¨arvi, Andreas Achtzehn, Petri Mahonen, DySPAN 2011, used with Permission

Improved Terrain Modeling

• © Rohan Murty et al SenseLess, DySPAN 2011

• 70-80% Improvement in white space via Longley Rice spatial modeling Rice spatial modeling with terrain

• White space today

• Dynamics become more intense over time

• Precomputatons

8

What Is Missing?

• Helpful Interference (Mouly & Pautet 83-87)– Admissions Control: permission to transmit

– Channel Control: guidance to safest channels

– Power Control: must obey power control– Power Control: must obey power control

⇒ DSA++ Databases for Interference Control

• Coordination-Control Language (Z.100 SDL)– 3D Space-Time Cause-Effect Behavior Modeling

– Mathematically Sound, Intuitive for Regulators

– Secure Foundation for Mutual Trust

9

Radio Environment Mapping“Constructing Radio Environment Maps with

Heterogeneous Spectrum Sensors” DySPAN 2011 Demonstration

Vladimir Atanasovski, Daniel Denkovski, Liljana Gavrilovska, Mihajlo Pavloski, ValentinRakovic, Faculty of Electrical Engineering, Ss. Cyril and Mehtodius, Skopje, ValentinRakovic, Faculty of Electrical Engineering, Ss. Cyril and Mehtodius, Skopje, Macedonia; Jaap van de Beek, Huawei Technologies Sweden, Radio Transmission Technologies—Research, Kista, Sweden; Antoine Dejonghe, Interuniversity Micro-Electronics Center (IMEC ), Leuven, Belgium; Berna Sayrac, Sebastien Grimoudy, Orange Labs, Issy-les-Moulineaux, France; Petri Mahonen, Janne Riihijarvi, Institute for Networked Systems, Janne Riihij¨arvi University, Aachen, Germany\

Naganawa et al, “Distributed Spectrum Sensing Utilizing Heterogeneous Wireless Devices and Measurement Equipment” DySPAN 2011

10

Sensor-Validated Modeling

11© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Compressive Sensing

12

J. N. Laska, W. F. Bradley, T. W. Rondeau, K. E. Nolan, and B. Vigoda, DySPAN11

Handset-BTS/BSC Sensing

Dynamic Spectrum Available[Riva Networks compact GSM]

Low Power, Building Shadowing, Creates GSM Reuse Op portunities

Fine Structure Sensing and ControlWiFi 1 Mbps VoIP Coverage (Green)

100 mW GSM GPRS (Blue) 25 kHz LMR Voice (1.2km Red)

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved14

LTE Advanced MIMO Directional Control

x(t)

x(t-τ1)

y(t)

x(t-τ2)

1st Bit

2nd Bit

3rd Bit

© 1999 MIT Lincoln Laboratory Used with Permission

Multiple Element Subspace TrackingATT as vBLAST aka MIMO100 λλλλ Array for 16 λλλλ Cost3x to 10x “Shannon” CapacityCOST: 1000x MIPS (practical ~2013)

© 2007 Stephen Fast, Remcom

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved15

Directional Sensing

© 2006 Dr. Joseph Mitola III Used with Permission

Sensing Highlights

• DVB-T Field Trials and Tools (Philips)

• Shape-Based Signal Classification (Supelec)

• Wavelet Edge Detection (A*Star Singapore)

• Multi -stage Cross Layer (UCLA)• Multi -stage Cross Layer (UCLA)

• Distributed Cooperative Sensing (U Mich, Deutsche Telcom; Stevens)

• Sensor Network Business Case (Telenor)

• Sensing vs. Databases (Vrije U, IMEC)

17

Comprehensive Spectrum Sensing

© 2005 Shared Spectrum Company (Dr. Mark McHenry) Used with Permission, adapted by the author

Processing Gain

Antenna Gain

Duty Cycle

Self Aware Networks

19

IBM Autonomic Network Challenge 2001 (traffic, time, power, CPNs, …)

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

CampbellEnergy

Bowen

FAA

Meyerrose Amoroso Hathaway Wynne Mitola

Sachs

ISP

Levinshon

Finance

Privacy - Law

LTG Elder

Peake

Medical

Rodriguez

Hi Tech

Atkins

Net Centric

BG Davis

STRATCOM

McCarthy

INSC

Gong

Taiwan

Luiijf

TNO

LTC Jazri

Malaysia

Globalization

Fifty five speakers: Draft Policy Guidebook

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved20

Turing-equivalent Security: Impossible

“This Sentence Is False”

Self-Reference

Scope of “sentence”?

Binary False Dilemma –it’s a paradox, a self-

contradictory statement

Valuable Intellectual Property of Stevens Institute of Technology – No Further Disclosure

21

Assertion Without Multi-Domain Support

If it’s true then it must be false, soAssert it false, and infer that it is true so

Assert it true, then it is false, but …

Computers Loop

Forever

Malware Goes Here

Malware Goes Here This Computer Is Secure

This Network Is Secure

Sony Root Kit“Ignore me”

Stack Overflow“Do This”

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Fatal Flaw MathematicsPrimitive Recursive Functions (PRF)

Gödel 1934Kleene 1941Mitola 1999[19]

g. While and Until Loops embody the Flaw

22

General Recursive Functions (GRF)

DO I=1,10 IF X=10 Call Y

X = X+1END Loop

© 2011 Dr. Joseph Mitola III All Rights Reserved

Policy ReasoningP

olicy Processing

Local Policy Repository

Active Policy Set

RF Environment Map

Data Sources

LocalSenso r

SensorNetworks Database

SpectrumUsage Info

Radio Info Base

•User & Radio ID•Location, Time•Status

Policy Statements from aPolicy Management Authority

-Downloadable- Securely Modifiable

RF Space-time Dynamics

TransmissionDecisions Requests

23

Policy P

rocessing

Policy Conformance Reasoner(PCR)

• Policy Decision Point

•Reasoning/Inference

• Conformance Checking

Control & Behavior Modeling

andReasoning

System Strategy Reasoner

Transmission Opportunity Requests/Replies

Policy Enforcer

Stored Transmission

Decision Replies (Approve or

Deny)

TX ControlCommands

TX ControlCommands

TX ControlReplies

Transmission Decision Refresh Request

TransmissionDecision RepliesTransmission

Decisions Replies

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Meta-Languages

24

Shujun Li, Collaborative Optimization of Cognitive Radio Parameters Using Ontology and Policy Based Approach (Boston: Northeastern University) 18 Dec 2009

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Cognitive Linguistics Things

25© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Cognitive Linguistics Behavior Model (CLBM)

Things “Everybody knows”

CLA first identifies the few universally common Thingsof a domain

Placesare the vector fields that characterize interaction possibilities for each Thing

Places “Near Field, BLOS”designate subspaces

Pathsare sequences of places through which action may occur

Paths “Multipath, MIMO”Basis for actions

26© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Modeling Radio DynamicsAction is the movement of a Thing along a Path

Actions“TX, RX”Induces

What happened

Transmit: Signal-In-Space = Thing.new(Tower)Transmit: Signal-In-Space = Thing.new(Tower)

Causeis the Thing that initiates an Action

Causes“ETSI”

ConstrainsWho to fine

Air Interface * Channel State

27© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

CLTD Policy Things

28

[Professors Hong Man and Joe Mitola, IEEE Conference on Semantics 2009]CLTD: Cognitive Linguistics for Technical Domains

© 2011 Dr. Joseph Mitola III All Rights Reserved

29© 1997-2010 Dr. Joseph Mitola III All Rights Reserved

30© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Balance of Powers

• Who is in Control?– Spectrum Monitoring May Reveal Too Much

• Essential Elements– Government Authority– Government Authority

– Industry-Commercial Incentives

– Highest Academic Quality

– US Model “Federally Funded R&D Center”

– Fraunhofer Model (1/3 Industrial Funding)• Trust via Government-Industry-Academic Oversight

31

Industry Cybersecurity Consensus

• Wireless Networks– Represent the most severe security requirements

– Identity, QoS/ Denial of Service, User Emulation

• Critical Needs• Critical Needs– LTE-equivalent security standard for converged

wireless-core multimedia networks

– Privacy-preserving identity-role[-situation agile?] management – beyond Role Based Access Control

• CLBM for Secure Geospatial DSA32

Summary• Spectrum Sensing is Not Dead

• Database is the first step

• Packing requires interference management– Which requires sensing unused channels, also known as white space

– Comprehensive Spectrum Databases• Space (Exact location), Time, RF (channels), Peak Power• Space (Exact location), Time, RF (channels), Peak Power

• Power Controls (Admission, Channel, EIRP/direction)

• Sensing, Reporting, Redaction (Remove Sensitive Data) and Enforcement

• Language for Behavior Modeling, Planning, Analysis

33© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

Conclusions• Radio Systems Engineering Complexity

– Commercially Responsive ⇒⇒⇒⇒ Efficient, Adaptive

– Regulatory Soundness ⇒⇒⇒⇒ Fair, Transparent, Trustworthy

⇒ Observable, Controllable, Secure⇒ Observable, Controllable, Secure

• Could We Seek a Global Consensus– European, US, Asian Leaders

– Market, Social, Government Value

– Cybersecurity of Edge Networks and Devices

– Charter Secure Geospatial DSA Organizations34

© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

References (1 of 3)1. George Lakoff, Women, Fire, and Dangerous Things ()19872. Ray Jackendoff,Semantics and Cognition, volume 8 of Current Studies in

Linguistics Series. MIT Press, Cambridge, Massachusetts 1983. 3. John R. Bender. 2001. Connecting language and vision using a conceptual

semantics, Master’s thesis, Massachusetts Institute of Technology.4. Keith Bonawitz, Anthony Kim, and Seth Tardiff, An Architecture for Word

Learning using Bidirectional Multimodal Structural AlignmentReport for NSF Award IIS-0218861 W03-0605.pdf (Cambridge, MA: MIT) 2003Award IIS-0218861 W03-0605.pdf (Cambridge, MA: MIT) 2003

5. Peter Gärdenfors, “Representing actions and functional properties in conceptual spaces,” Body, Language, Mind: EmbodimentT. Ziemke et al, Editors (Berlin: Mouton de Gruyter) 2007

6. M. Johnson and T. Rohrer “We are live creatures: Embodiment, American Pragmatism” in T. Ziemke, Ibid

7. John Koza, www.genetic-programming.org; Genetic Programming (Volumes 1 [92, MIT Press] through IV [Kluwer, 2003])

8. Jing Liu et al, “Moving Block Sequence and Organizational Evolutionary Algorithm for General Floorplanning with Arbitrarily Shaped Rectilinear Blocks” IEEE Trans Evolutionary Computation (NY: IEEE Press) Oct 08

35© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

References (2 of 3)9. John S. Powell, “Cognitive and Software Radio: A Public Safety Regulatory

Perspective” (nstpc.org) 2004

10. J. Mitola, Software Radio Architecture (NY: Wiley) 2000

11. J. Mitola, Cognitive Radio Architecture (NY: Wiley) 2006

12. W. Wayt Gibbs, “Autonomic Computing,” Scientific American (NY: Scientific American) May 2002

13. Halimic et al, “Optimal Functional Mapping Onto End-To-End Reconfigurable (E2R) Equipment Hardware Platform,” Proc. SDR Forum Technical Conference 2006 (Orlando, FL: SDR Forum) 2006

14. Gary Rose, Wireless Broadband and the Redlining of Rural America (www.wirelessfuture.newamerica.net) April 2010

15. I. Suzuki et al, “Reduced Cluster Search ML Decoding for QO-STBC Systems” (Brazil: State University of Londrina) 2009

16. E. Bogenfeld & Ingo Gaspard "Self-x in Radio Access Networks,” E3 White Paper (Version 1.0, 2008-12-22) 2008

36© 1997-2011 Dr. Joseph Mitola III All Rights Reserved

References (3 of 3)17. Dominique NUSSBAUM et al, “Open Platform For Prototyping Of Advanced

Software Defined Radio And Cognitive Radio Techniques,” Proc. 12th EuromicroConference on Digital System Design(NY: IEEE Press)2009

18. Erol Gelenbe et al, “Self-Aware Networks and QoS,” Proc. IEEE (NY: IEEE Press) Sep 2004

37© 1997-2011 Dr. Joseph Mitola III All Rights Reserved