Password authentication with insecure communication
Communications of the ACM
DIMSUMNet: New Directions in Wireless Networking Using Coordinated Dynamic Spectrum Access
WOWMOM '05 Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks
A survey of key management schemes in wireless sensor networks
Computer Communications
Hash Function Vulnerability Index and Hash Chain Attacks
NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
Towards secure spectrum decision
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
Secure Distributed Routing Algorithm with Optimizing Energy Consumption for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Cognitive radio networks sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing can be more accurate if jointly performed by several nodes. In order to get a successful result, avoiding fake nodes' inputs is required and so, it is necessary to authenticate their local sensing reports. A few authentication algorithms have been proposed up to now. However, they introduce a notable overhead in lightweight hard decision systems. In this paper we present an efficient protocol based on symmetric cryptography and one-way functions, and an analysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.