Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Security Threats in Cognitive Radio Networks
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
The security in cognitive radio networks: a survey
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Securing cognitive radio networks
International Journal of Communication Systems
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Security threats in cognitive radio applications
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs), secure communication in CRNs becomes more critical than for other conventional Wireless networks. So, in this paper we propose a trust-based security solution for CRNs. Trust is calculated from the requesting node depending on various communication attributes and the evaluated trust is compared with the trust threshold value. Depending on the resultant decision, the requested service is available to the requesting user. We prove the security of our proposed scheme in terms of security analysis.