Digital signature-based authentication framework in cognitive radio networks

Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a technology to solve spectrum source deficiency by improving effective utilization of limited radio spectrum resources for future wireless communications and mobile computing. However, the unique characteristics of CRNs make security a greater challenge. Moreover, due to the dynamic characteristics of CRNs, a member of CRNs, may join or leave the network at any time. The issue of supporting secure communication in CRNs therefore becomes more serious than for conventional wireless networks. Public key encryption and signature techniques have been adopted here to ensure the security of message transmission in CRNs. This work proposes a digital signature-based trust-oriented scheme to ensure communication by identifying efficient trustworthy users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof.

[1]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[2]  Fang Yong,et al.  A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[3]  Ying-Chang Liang,et al.  Cognitive radio network architecture: part II -- trusted network layer structure , 2008, ICUIMC '08.

[4]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[5]  Cheng Li,et al.  The security in cognitive radio networks: a survey , 2009, IWCMC.

[6]  Farookh Khadeer Hussain,et al.  Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[7]  Chittabrata Ghosh,et al.  Secure Communication in Cognitive Radio Networks , 2022 .

[8]  Zenon Chaczko,et al.  Security threats in Cognitive Radio applications , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.

[9]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[10]  Yuan Zhang,et al.  Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[11]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[12]  Roy H. Campbell,et al.  Dynamic access control: preserving safety and trust for network defense operations , 2003, SACMAT '03.

[13]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[14]  Song Han,et al.  Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[15]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010 .

[16]  Ben-Jye Chang,et al.  Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[17]  Song Han,et al.  Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[18]  Máire O'Neill,et al.  Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010, Int. J. Commun. Syst..

[21]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[22]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.