Prevention against threats to self co-existence - a novel authentication protocol for cognitive radio networks

2.50
Hdl Handle:
http://hdl.handle.net/10547/336066
Title:
Prevention against threats to self co-existence - a novel authentication protocol for cognitive radio networks
Authors:
Safdar, Ghazanfar Ali ( 0000-0001-8969-1044 ) ; Albermany, Salah A.; Aslam, Nauman; Mansour, Ali; Epiphaniou, Gregory
Abstract:
Cognitive radio networks are intelligent networks that can sense the environment and adapt the communication parameters accordingly. These networks find their applications in co-existence of different wireless networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio networks additionally have their own set of unique security threats and challenges, such as selfish misbehaviours, self-coexistence, license user emulation and attacks on spectrum managers; accordingly the security protocols developed for these networks must have abilities to counter these attacks. This paper presents a novel cognitive authentication protocol, called CoG-Auth, aimed to provide security in cognitive radio networks against threats to self co-existence. CoG-Auth does not require presence of any resource enriched base stations or centralised certification authorities, thus enabling it to be applicable to both infrastructure and ad hoc cognitive radio networks. The CoG-Auth design employs key hierarchy; such as temporary keys, partial keys and session keys to fulfil the fundamental requirements of security. CoG-Auth is compared with IEEE 802.16e standard PKMv2 for performance analysis; it is shown that CoG-Auth is secure, more efficient, less computational intensive, and performs better in terms of authentication time, successful authentication and transmission rate.
Affiliation:
University of Bedfordshire
Citation:
Safdar, G.A., Albermany, S., Aslam, N., Mansour, A., Epiphaniou, G. (2014) 'Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks', Wireless and Mobile Networking Conference (WMNC), 7th IFIP, 20-22 May 2014, pp.1-6
Publisher:
IEEE
Issue Date:
May-2014
URI:
http://hdl.handle.net/10547/336066
DOI:
10.1109/WMNC.2014.6878857
Additional Links:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6878857
Type:
Conference papers, meetings and proceedings
Language:
en
Appears in Collections:
Centre for Wireless Research (CWR)

Full metadata record

DC FieldValue Language
dc.contributor.authorSafdar, Ghazanfar Alien
dc.contributor.authorAlbermany, Salah A.en
dc.contributor.authorAslam, Naumanen
dc.contributor.authorMansour, Alien
dc.contributor.authorEpiphaniou, Gregoryen
dc.date.accessioned2014-11-25T13:35:57Z-
dc.date.available2014-11-25T13:35:57Z-
dc.date.issued2014-05-
dc.identifier.citationSafdar, G.A., Albermany, S., Aslam, N., Mansour, A., Epiphaniou, G. (2014) 'Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks', Wireless and Mobile Networking Conference (WMNC), 7th IFIP, 20-22 May 2014, pp.1-6en
dc.identifier.doi10.1109/WMNC.2014.6878857-
dc.identifier.urihttp://hdl.handle.net/10547/336066-
dc.description.abstractCognitive radio networks are intelligent networks that can sense the environment and adapt the communication parameters accordingly. These networks find their applications in co-existence of different wireless networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio networks additionally have their own set of unique security threats and challenges, such as selfish misbehaviours, self-coexistence, license user emulation and attacks on spectrum managers; accordingly the security protocols developed for these networks must have abilities to counter these attacks. This paper presents a novel cognitive authentication protocol, called CoG-Auth, aimed to provide security in cognitive radio networks against threats to self co-existence. CoG-Auth does not require presence of any resource enriched base stations or centralised certification authorities, thus enabling it to be applicable to both infrastructure and ad hoc cognitive radio networks. The CoG-Auth design employs key hierarchy; such as temporary keys, partial keys and session keys to fulfil the fundamental requirements of security. CoG-Auth is compared with IEEE 802.16e standard PKMv2 for performance analysis; it is shown that CoG-Auth is secure, more efficient, less computational intensive, and performs better in terms of authentication time, successful authentication and transmission rate.en
dc.language.isoenen
dc.publisherIEEEen
dc.relation.urlhttp://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6878857en
dc.subjectcognitive radioen
dc.subjectcryptographic protocolsen
dc.subjectsecurityen
dc.subjectencryptionen
dc.subjectwireless networksen
dc.titlePrevention against threats to self co-existence - a novel authentication protocol for cognitive radio networksen
dc.typeConference papers, meetings and proceedingsen
dc.contributor.departmentUniversity of Bedfordshireen
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.