Abstract
The unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats such as selfish misbehaviours, primary user emulation and attacks on spectrum managers. A secure MAC protocol is required to maintain the CRNs and operate against the possible threats. This paper is a second generation of the Secure MAC protocol for CRNs (SMCRN) to address the security requirements in CRNs and introduces a novel method based on Shared-key cryptography. The paper mainly presents performance analysis of shared key based SMCRN protocol. The paper also discusses and compares SMCRN for Symmetric and Asymmetric cryptography Techniques. The proposed protocol is analysed and described using the formal Burrows-Abadi-Needham (BAN) logic to prove the protocol operation for addressing the security requirements. Moreover, the implementation of current protocol is provided to compute the overall time over both Common Control Channel (CCC) and data transmission channel.Citation
Alhakami, W., Mansour, A. and Safdar, G.A. (2014) 'Shared-Key based Secure MAC protocol for CRNS', NGMAST2014, 8th International Conference on Next Generation Mobile Apps, Services and TechnologiesPublisher
IEEEAdditional Links
https://ieeexplore.ieee.org/document/6982927Type
Conference papers, meetings and proceedingsLanguage
enae974a485f413a2113503eed53cd6c53
10.1109/NGMAST.2014.30