Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Security Threats in Cognitive Radio Networks
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
The security in cognitive radio networks: a survey
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Securing cognitive radio networks
International Journal of Communication Systems
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Security threats in cognitive radio applications
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Digital Signature-Based Secure Communication in Cognitive Radio Networks
BWCCA '11 Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a technology to solve spectrum source deficiency by improving effective utilization of limited radio spectrum resources for future wireless communications and mobile computing. However, the unique characteristics of CRNs make security a greater challenge. Moreover, due to the dynamic characteristics of CRNs, a member of CRNs, may join or leave the network at any time. The issue of supporting secure communication in CRNs therefore becomes more serious than for conventional wireless networks. Public key encryption and signature techniques have been adopted here to ensure the security of message transmission in CRNs. This work proposes a digital signature-based trust-oriented scheme to ensure communication by identifying efficient trustworthy users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof.