Visible to the public Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks

TitleAnonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Publication TypeConference Paper
Year of Publication2014
AuthorsRahman, S.M.M., Kamruzzaman, S.M., Almogren, A., Alelaiwi, A., Alamri, A., Alghamdi, A.
Conference NameMultimedia (ISM), 2014 IEEE International Symposium on
Date PublishedDec
KeywordsAd hoc networks, anonymous routing, anonymous-secure communication protocol, Cognitive radio, cognitive radio (CR) networks, cognitive radio ad hoc networks, CR ad hoc networks, CR media, CRAN, cryptographic protocols, cryptography, destination node, disaster recovery communication network, end-to-end delay, Energy efficiency, location anonymity, network throughput, operational aspect, pairing-based cryptography, privacy, Protocols, Routing, Routing protocols, secure anonymous routing, secure communication, security aspect, source node, spectrum allocation, spectrum resource scarcity, spectrum sensing, telecommunication security, wireless communication media
Abstract

Cognitive radio (CR) networks are becoming an increasingly important part of the wireless networking landscape due to the ever-increasing scarcity of spectrum resources throughout the world. Nowadays CR media is becoming popular wireless communication media for disaster recovery communication network. Although the operational aspects of CR are being explored vigorously, its security aspects have gained less attention to the research community. The existing research on CR network mainly focuses on the spectrum sensing and allocation, energy efficiency, high throughput, end-to-end delay and other aspect of the network technology. But, very few focuses on the security aspect and almost none focus on the secure anonymous communication in CR networks (CRNs). In this research article we would focus on secure anonymous communication in CR ad hoc networks (CRANs). We would propose a secure anonymous routing for CRANs based on pairing based cryptography which would provide source node, destination node and the location anonymity. Furthermore, the proposed research would protect different attacks those are feasible on CRANs.

URLhttp://ieeexplore.ieee.org/document/7033057/
DOI10.1109/ISM.2014.85
Citation Key7033057