Login | Register

A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks

Title:

A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks

Khasawneh, Mahmoud and Agarwal, Anjali (2017) A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks. IEEE Access, 5 . pp. 15597-15608. ISSN 2169-3536

[thumbnail of agarwal-2017-ieee-access.pdf]
Preview
Text (application/pdf)
agarwal-2017-ieee-access.pdf - Published Version
Available under License Spectrum Terms of Access.
6MB

Official URL: http://dx.doi.org/10.1109/ACCESS.2017.2723322

Abstract

Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. Wireless security in cognitive radio network (CRN) is a challenging technical area due to the dynamic and unique characteristics of CRNs. As a cognitive node can dynamically join or leave the spectrum, providing secure communication becomes problematic and requires more investigation. Authentication is a primary security property in wireless networks wherein the identity of a cognitive node is verified before providing access to available resources. In this paper, a two-level authentication scheme for communication in CRN is proposed. Before joining the network, a CR node is validated by obtaining security credentials from an authorized point. The proposed scheme relies on public- and symmetric-key cryptography, instead of using a digital signaturebased approach. It encrypts data between the communicating nodes in order to improve network security in terms of resource availability and accessibility.This mitigates attacks such as Reflection attack, Denial of Service attack and Man-in-the-Middle attack. The scheme has been evaluated and verified in terms of security functionality, its correctness and the performance, which shows less computation and communication requirements.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Article
Refereed:Yes
Authors:Khasawneh, Mahmoud and Agarwal, Anjali
Journal or Publication:IEEE Access
Date:4 July 2017
Digital Object Identifier (DOI):10.1109/ACCESS.2017.2723322
Keywords:Authentication, Protocols, Cryptography, Cognitive radio, Wireless sensor networks, Wireless networks
ID Code:982673
Deposited By: Danielle Dennie
Deposited On:29 Aug 2017 14:55
Last Modified:18 Jan 2018 17:55

References:

[1] Mitola, J.: Cognitive radio for flexible mobile multimedia communications. IEEE International Workshop on Mobile Multimedia Communications, (MoMuC’99), pp. 3-10 (1999)

[2] Niyato, D., & Hossain, E.: Spectrum trading in cognitive radio networks: A market-equilibrium-based approach. IEEE Wireless Communications, vol. 15(6), pp. 71-80 (2008)

[3] Crocioni, P.: Is allowing trading enough? Making secondary markets in spectrum work. Telecommunications Policy, vol. 33(8), pp. 451-468 (2009)

[4] Khasawneh, M., & Agarwal, A.: A survey on security in Cognitive Radio networks. International Conference on Computer Science and Information Technology (CSIT), pp. 64-70 (2014)

[5] Akyildiz, Y.: OFDM-Based Cognitive Radio Networks. In Cognitive wireless communications networks, pp. 189-211 (2006)

[6] El-Hajj, W., Safa, H. & Guizani, M.: Survey of Security Issues in Cognitive Radio Network. Journal of Internet Technology. vol. 12(2), pp. 1-18 (2011)

[7] Sodagari, S. & Clancy, T. C.: An Anti-Jamming Strategy for Channel Access in Cognitive Radio Networks, Decision and Game Theory for Security, LNCS. vol. 7037, pp. 34-43 (2011)

[8] Zhao, J. & Cao, G.: Robust Topology Control In Multi-Hop Cognitive Radio Networks. INFOCOM. pp. 2032-2040 (2012)

[9] Khasawneh, M., Kajman, I., Alkhudaidy, R. & Althubyani A.: A Survey on Wi-Fi Protocols: WPA and WPA2. International Conference on Security in Computer Networks and Distributed Systems, SNDS, pp. 496-511 (2014)

[10] Wong, K., Zheng, Y., Cao, J. &Wang, S.: A Dynamic user authentication scheme for WSN. IEEE International Conference on Sensor Networks, Ubiquitous Computing, and Trustworthy Computing SUTC, pp. 244-251 (2006)

[11] Tseng, H., Jan, R. Yang, W.: An Improved Dynamic User Authentication Scheme for WSN. GLOBECOM, pp. 986-990 (2007)

[12] Han, K., ShiakShon, T. & Kim, K.: Efficient Mobile Sensor Authentication in Smart Home, IEEE Transaction on Consumer Electronics. vol. 56(2),pp. 591-596 (2010)

[13] Zhu, S. Setia, S. & Jajodia, S.: LEAP: efficient security mechanisms in large scale distributed networks. 10th ACM Conference on Computers and Communication Security (CCS), pp. 62-72 (2003)

[14] Ning, P., Liu, A. & Du, W.: Mitigating DOS attacks against broadcast authentication in WSN. ACM Transactions on Sensor Networks. vol. 4(1), pp. 1-35 (2008).

[15] Tan, X., Borle K., Du,W. & Chen, B.: Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio. 4th ACM conference on Wireless Network Security, WiSec, pp. 1-12 (2011)

[16] Kim, HS.: Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications. vol. 34(4), pp. 1160-1167 (2011)

[17] Parvin, S. H. & Khadeer, F.: Digital signature-based secure communication in cognitive radio networks. Broadband and Wireless Computing, Communication and Applications, BWCCA, pp. 230-235 (2011)

[18] Parvin, S., Han, S., Tian, B., & Kadeer, H.F.: Trust based authentication for secure communication in cognitive radio networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC, pp. 589-596 (2010)

[19] Parvin, S., Khadeer, F.H., & Khadeer, O.H.: Digital signature-based authentication framework in cognitive radio networks, 10th International Conference on Advances in Mobile Computing & Multimedia, pp. 136-142 (2012)

[20] Chatterjee, K., De, A., & Gupta, D.: A secure and efficient authentication protocol in wireless sensor network. Wireless Personal Communication, vol. 81(1), pp. 17-37 (2015)

[21] Liu, Y., Ning, P., & Dai, H.: Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. IEEE Symposium on Security and Privacy (SP), pp. 286-301 (2010)

[22] Burrows, M., Abadi, M., & Needham, R.: A Logic of authentication. ACM Transactions on Computer Systems. vol. 8(1), pp. 18-36 (1990)

[23] Cremers. C.: Scyther User Manual, Available at: http://profs.info.uaic.ro/ cbirjoveanu/web/Ps/Scyther/scyther-manual.pdf, (2017). Accessed May, 16th, 2017

[24] Crypto++ 5.6.0 Benchmarks, Available at: http://www.cryptopp.com/benchmarks.html, (2017). Accessed May, 16th, 2017.
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top