A novel common control channel security framework for cognitive radio networks

作者: G.A. Safdar , M. O' , N.A. Neill

DOI: 10.1504/IJAACS.2012.046281

关键词:

摘要: Cognitive radio technology makes use of the underutilised spectrum opportunistically without causing interference to primary users. Cooperatively communicating cognitive devices common control channel medium access perform free announcements, selection and reservation before any actual data transmission. Common security is vital in order ensure subsequent communication among nodes. Additional well-known problems wireless networks, networks introduce new classes threats challenges, such as misbehaviours sensing, licensed user emulation attacks transactions. This paper presents a novel framework (protocol) for cooperatively networks. To best authors knowledge, this first address requirements channel. An implementation proposed protocol discussed illustrating how two nodes can authenticate each other prior confidential negotiations. The formally validated by GNY logic analysis illustrates that it meets principal authentication, confidentiality, integrity non-repudiation.

参考文章(27)
J Park, K Ren, Kwangjo Kim, J Yang, H Lee, Mutual Authentication Protocol for Low-cost RFID international cryptology conference. pp. 17- 24 ,(2005)
D. Longley, S. Rigby, Refereed articles: An automatic search for security flaws in key management schemes Computers & Security. ,vol. 11, pp. 75- 89 ,(1992) , 10.1016/0167-4048(92)90222-D
Alan G. Konheim, Computer Security and Cryptography ,(2007)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Marie-Jeanne Toussaint, Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract) international cryptology conference. pp. 24- 43 ,(1991)
Marie-Jeanne Toussaint, Deriving the Complete Knowledge of Participants in Cryptographic Protocols international cryptology conference. pp. 24- 43 ,(1991) , 10.1007/3-540-46766-1_2
Catherine Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol Journal of Computer Security. ,vol. 1, pp. 5- 35 ,(1992) , 10.3233/JCS-1992-1102
Shih-Lin Wu, Chih-Yu Lin, Yu-Chee Tseng, Jang-Laing Sheu, A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks international symposium on parallel architectures algorithms and networks. pp. 232- 237 ,(2000) , 10.1109/ISPAN.2000.900290
R.A. Kemmerer, Analyzing encryption protocols using formal verification techniques IEEE Journal on Selected Areas in Communications. ,vol. 7, pp. 448- 457 ,(1989) , 10.1109/49.17707
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740