SPINS: security protocols for sensor networks
Wireless Networks
A survey of key management schemes in wireless sensor networks
Computer Communications
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Secured communication over frequency-selective fading channels: a practical vandermonde precoding
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
IEEE Transactions on Mobile Computing
A real orthogonal space-time coded UWB scheme for wireless secure communications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Towards secure spectrum decision
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey of spectrum sensing algorithms for cognitive radio applications
IEEE Communications Surveys & Tutorials
Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks
IEEE Transactions on Wireless Communications
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
Hi-index | 0.01 |
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm. Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users' privacy.