• DocumentCode
    1784928
  • Title

    Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks

  • Author

    Safdar, Ghazanfar A. ; Albermany, S. ; Aslam, Nauman ; Mansour, Ayman ; Epiphaniou, G.

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Univ. of Bedfordshire, Luton, UK
  • fYear
    2014
  • fDate
    20-22 May 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Cognitive radio networks are intelligent networks that can sense the environment and adapt the communication parameters accordingly. These networks find their applications in co-existence of different wireless networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio networks additionally have their own set of unique security threats and challenges, such as selfish misbehaviours, self-coexistence, license user emulation and attacks on spectrum managers; accordingly the security protocols developed for these networks must have abilities to counter these attacks. This paper presents a novel cognitive authentication protocol, called CoG-Auth, aimed to provide security in cognitive radio networks against threats to self co-existence. CoG-Auth does not require presence of any resource enriched base stations or centralised certification authorities, thus enabling it to be applicable to both infrastructure and ad hoc cognitive radio networks. The CoG-Auth design employs key hierarchy; such as temporary keys, partial keys and session keys to fulfil the fundamental requirements of security. CoG-Auth is compared with IEEE 802.16e standard PKMv2 for performance analysis; it is shown that CoG-Auth is secure, more efficient, less computational intensive, and performs better in terms of authentication time, successful authentication and transmission rate.
  • Keywords
    cognitive radio; cryptographic protocols; CoG-Auth design; base stations; centralised certification authorities; cognitive radio networks; dynamic spectrum access; intelligent networks; interference mitigation; novel cognitive authentication protocol; security protocols; self co-existence; wireless networks; Authentication; Cognitive radio; Encryption; Protocols; Standards; Authentication; Cognitive Radio; Cryptography; Protocol; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless and Mobile Networking Conference (WMNC), 2014 7th IFIP
  • Conference_Location
    Vilamoura
  • Type

    conf

  • DOI
    10.1109/WMNC.2014.6878857
  • Filename
    6878857