• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Wireless Research (CWR)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Wireless Research (CWR)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    Prevention against threats to self co-existence - a novel authentication protocol for cognitive radio networks

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Safdar, Ghazanfar Ali
    Albermany, Salah A.
    Aslam, Nauman
    Mansour, Ali
    Epiphaniou, Gregory
    Affiliation
    University of Bedfordshire
    Issue Date
    2014-05
    Subjects
    cognitive radio
    cryptographic protocols
    security
    encryption
    wireless networks
    
    Metadata
    Show full item record
    Abstract
    Cognitive radio networks are intelligent networks that can sense the environment and adapt the communication parameters accordingly. These networks find their applications in co-existence of different wireless networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio networks additionally have their own set of unique security threats and challenges, such as selfish misbehaviours, self-coexistence, license user emulation and attacks on spectrum managers; accordingly the security protocols developed for these networks must have abilities to counter these attacks. This paper presents a novel cognitive authentication protocol, called CoG-Auth, aimed to provide security in cognitive radio networks against threats to self co-existence. CoG-Auth does not require presence of any resource enriched base stations or centralised certification authorities, thus enabling it to be applicable to both infrastructure and ad hoc cognitive radio networks. The CoG-Auth design employs key hierarchy; such as temporary keys, partial keys and session keys to fulfil the fundamental requirements of security. CoG-Auth is compared with IEEE 802.16e standard PKMv2 for performance analysis; it is shown that CoG-Auth is secure, more efficient, less computational intensive, and performs better in terms of authentication time, successful authentication and transmission rate.
    Citation
    Safdar, G.A., Albermany, S., Aslam, N., Mansour, A., Epiphaniou, G. (2014) 'Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks', Wireless and Mobile Networking Conference (WMNC), 7th IFIP, 20-22 May 2014, pp.1-6
    Publisher
    IEEE
    URI
    http://hdl.handle.net/10547/336066
    DOI
    10.1109/WMNC.2014.6878857
    Additional Links
    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6878857
    Type
    Conference papers, meetings and proceedings
    Language
    en
    ae974a485f413a2113503eed53cd6c53
    10.1109/WMNC.2014.6878857
    Scopus Count
    Collections
    Centre for Wireless Research (CWR)

    entitlement

     
    DSpace software (copyright © 2002 - 2023)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.