A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks

Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. Wireless security in CR network (CRN) is a challenging technical area due to the dynamic and unique characteristics of CRNs. As a cognitive node can dynamically join or leave the spectrum, providing secure communication becomes problematic and requires more investigation. Authentication is a primary security property in wireless networks, wherein the identity of a cognitive node is verified before providing access to available resources. In this paper, a two-level authentication scheme for communication in a CRN is proposed. Before joining the network, a CR node is validated by obtaining security credentials from an authorized point. The proposed scheme relies on public- and symmetric-key cryptography, instead of using a digital signature-based approach. It encrypts data between the communicating nodes in order to improve network security in terms of resource availability and accessibility. This mitigates attacks such as reflection attack, denial of service attack, and man-in-the-middle attack. The scheme has been evaluated and verified in terms of security functionality, its correctness, and the performance, which shows less computation and communication requirements.

[1]  Farookh Khadeer Hussain,et al.  Digital signature-based authentication framework in cognitive radio networks , 2012, MoMM '12.

[2]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[3]  Pietro Crocioni Is allowing trading enough? Making secondary markets in spectrum work , 2009 .

[4]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[5]  Song Han,et al.  Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[6]  Rakesh Rajbanshi OFDM-based cognitive radio for DSA networks , 2007 .

[7]  Mahmoud Khasawneh,et al.  A Survey on Wi-Fi Protocols: WPA and WPA2 , 2014, SNDS.

[8]  Kakali Chatterjee,et al.  A Secure and Efficient Authentication Protocol in Wireless Sensor Network , 2015, Wirel. Pers. Commun..

[9]  Anjali Agarwal,et al.  A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).

[10]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[11]  Wenliang Du,et al.  Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.

[12]  Joseph Mitola Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..

[13]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[14]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[15]  Dusit Niyato,et al.  Spectrum trading in cognitive radio networks: A market-equilibrium-based approach , 2008, IEEE Wirel. Commun..

[16]  Jing Zhao,et al.  Robust Topology Control in Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.

[17]  Kwangjo Kim,et al.  Efficient mobile sensor authentication in smart home and WPAN , 2010, IEEE Transactions on Consumer Electronics.

[18]  Shabnam Sodagari,et al.  An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.

[19]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[20]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[21]  Norio Shiratori,et al.  Kurihara Green ICT Project-Towards Symbiosis between Human's Life and Nature , 2011 .

[22]  Farookh Khadeer Hussain,et al.  Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[23]  Hyun Sung Kim,et al.  Location-based authentication protocol for first cognitive radio networking standard , 2011, J. Netw. Comput. Appl..