Show simple item record

dc.contributor.authorAlhakami, Wajdien
dc.contributor.authorMansour, Alien
dc.contributor.authorSafdar, Ghazanfar Alien
dc.contributor.authorAlbermany, Salah A.en
dc.date.accessioned2014-11-25T13:32:20Z
dc.date.available2014-11-25T13:32:20Z
dc.date.issued2014-10
dc.identifier.citationAlhakami, W., Mansour, A, Safdar, G.A., Albermany, S. (2014) 'A secure MAC protocol for Cognitive Radio Networks (SMCRN)', Science and Information Conference (SAI), 7-9 Oct. 2013, pp.796-803en
dc.identifier.otherINSPEC 13899559
dc.identifier.urihttp://hdl.handle.net/10547/336091
dc.description.abstractIn addition to standard authentication and data confidentiality requirements, Cognitive Radio Networks (CRNs) face distinct security issues such as primary user emulation and spectrum management attacks. A compromise of these will result in a denial of service, eavesdropping, forgery, or replay attack. These attacks must be considered while designing a secure media access control (MAC) protocol for CR networks. This paper presents a novel secure CR MAC protocol: the presented protocol is analysed for these security measures using formal logic methods such as Burrows-Abadi-Needham (BAN) logic. It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequent secure communication.
dc.language.isoenen
dc.publisherIEEEen
dc.relation.urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6661832en
dc.subjectaccess protocolsen
dc.subjectcognitive radioen
dc.subjectcryptographic protocolsen
dc.subjectradio spectrum managementen
dc.subjecttelecommunication securityen
dc.titleA secure MAC protocol for Cognitive Radio Networks (SMCRN)en
dc.typeConference papers, meetings and proceedingsen
dc.contributor.departmentUniversity of Bedfordshireen
html.description.abstractIn addition to standard authentication and data confidentiality requirements, Cognitive Radio Networks (CRNs) face distinct security issues such as primary user emulation and spectrum management attacks. A compromise of these will result in a denial of service, eavesdropping, forgery, or replay attack. These attacks must be considered while designing a secure media access control (MAC) protocol for CR networks. This paper presents a novel secure CR MAC protocol: the presented protocol is analysed for these security measures using formal logic methods such as Burrows-Abadi-Needham (BAN) logic. It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequent secure communication.


This item appears in the following Collection(s)

  • Centre for Wireless Research (CWR)
    The Centre for Wireless Research brings together expertise in the areas of mobile and wireless sensor networks. The breadth and depth of the expertise make the Centre rich with research and innovation potential.

Show simple item record