DocumentCode :
3293841
Title :
A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios
Author :
Kuroda, Masahiro ; Nomura, Ritsu ; Trappe, Wade
Author_Institution :
Nat. Inst. of Inf. & Commun. Technol., Yokosuka
fYear :
2007
fDate :
18-21 June 2007
Firstpage :
70
Lastpage :
79
Abstract :
Securing future wireless networks will be a critical challenge as the popularity of mobile communications implies that wireless networks will be the target of abuse. The next generation of wireless networks, as envisioned by recent advances in cognitive radio (CR) technologies, will be autonomic and able to adjust their configuration to changes in the communication environment. Unfortunately, the authentication frameworks for various radio technologies, such as IEEE802.11 and 802.16, are quite different from one another and, in order to support radio reconfiguration, it is necessary to devise an appropriate authentication framework for CR systems. In this paper, we propose a radio-independent authentication protocol for CRs that is independent of the underlying radio protocols and able to support EAP transport. The re-keying protocol assumes user-specific information, such as location information, as a key seed. The keys for authentication and encryption are derived from the historical location registry of a mobile terminal. The keys are frequently updated as mobile users´ position varies. After discussing authentication issues for CR networks, radio-independent authentication via location information, and application to EAP transport, we evaluate the confidentiality of the key management method and its integration with EAP, thereby supporting the effectiveness of our key management method for CR networks.
Keywords :
cognitive radio; mobile communication; protocols; telecommunication security; authentication framework; cognitive radio network; key management method; location information; mobile terminal; radio reconfiguration; radio-independent authentication protocol; re-keying protocol; wireless security; Appropriate technology; Authentication; Chromium; Cognitive radio; Cryptography; Mobile communication; Next generation networking; Radio spectrum management; Transport protocols; Wireless networks; DoS attack; EAP; authentication protocol; carousel; cognitive radio; key management; location information; wireless security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON '07. 4th Annual IEEE Communications Society Conference on
Conference_Location :
San Diego, CA
Print_ISBN :
1-4244-1268-4
Electronic_ISBN :
1-4244-1268-4
Type :
conf
DOI :
10.1109/SAHCN.2007.4292819
Filename :
4292819
Link To Document :
بازگشت