Research on the Key Agreement and Authentication of Cognitive Radio Networks

Identity authentication is one of the key problems to be solved in cognitive radio networks. Current authentication mechanisms for cognitive radio networks are based on PPP Extensible Authentication Protocols. Future cognitive radio network can fusion current wireless standards. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, an identity authentication mechanism based on Certification Authority (CA) is proposed in this paper. The mechanism adopts SIM authentication for terminal users and secure tunnel +certificates for servers. CA can resolve identity authentication problem of base station, assure security of base station and CA by secure tunnel in core networks. And current Challenge Handshake Protocol is also improved; challenge handshake exists in whole communication process which resolves connection robbing problem.

[1]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.

[2]  Jin-Young Choi,et al.  Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[3]  Anne-Marie Welling,et al.  Work in progress. , 2012, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[4]  Tadanori Mizuno,et al.  Evaluation of EAP based Re-authentication Protocol for High-speedVehicular Handover in Cognitive Radio Networks , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[5]  Li Zhu,et al.  A New Random Number Generate Algorithm for Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[6]  Masahiro Kuroda,et al.  A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[8]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[9]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .

[10]  Hannes Tschofenig,et al.  The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.