Authentication protocols for computer networks: I
Computer Networks and ISDN Systems
ACM Transactions on Computer Systems (TOCS)
An automatic search for security flaws in key management schemes
Computers and Security
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Formal Verification of Cryptographic Protocols: A Survey
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
ISPAN '00 Proceedings of the 2000 International Symposium on Parallel Architectures, Algorithms and Networks
Short Paper: A Secure Interworking Scheme for UMTS-WLAN
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A Secure Communication Protocol for Low-Cost RFID System
CIT '07 Proceedings of the 7th IEEE International Conference on Computer and Information Technology
DCR-MAC: distributed cognitive radio MAC protocol for wireless ad hoc networks
Wireless Communications & Mobile Computing
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
Hi-index | 0.00 |
Cognitive radio technology makes use of the underutilised spectrum opportunistically without causing interference to the primary users. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to perform free channel announcements, channel selection and channel reservation before any actual data transmission. Common control channel security is vital in order to ensure security in the subsequent communication among the cognitive radio nodes. Additional to well-known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as misbehaviours in spectrum sensing, licensed user emulation and attacks in the common control channel transactions. This paper presents a novel common control channel security framework (protocol) for cooperatively communicating cognitive radio networks. To the best of the authors knowledge, this is the first paper to address the security requirements of the common control channel. An implementation of the proposed security protocol is discussed illustrating how two cognitive radio nodes can authenticate each other prior to any confidential common control channel negotiations. The protocol is formally validated by GNY logic and a security analysis of the protocol illustrates that it meets the principal security requirements of authentication, confidentiality, integrity and non-repudiation.