Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Title | Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Hussain, Muzzammil, Swami, Tulsi |
Conference Name | 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) |
Date Published | sep |
ISBN Number | 978-1-5386-5314-2 |
Keywords | authentication, Base stations, Cognitive radio, Cognitive Radio Network, Cognitive Radio Security, CRN, cryptography, emulation, node authentication, pregenerated hash digest, primary user authentication, primary user emulation attack, pubcrawl, PUEA, radio networks, resilience, Resiliency, Sensors, telecommunication security |
Abstract | The primary objective of Cognitive Radio Networks (CRN) is to opportunistically utilize the available spectrum for efficient and seamless communication. Like all other radio networks, Cognitive Radio Network also suffers from a number of security attacks and Primary User Emulation Attack (PUEA) is vital among them. Primary user Emulation Attack not only degrades the performance of the Cognitive Radio Networks but also dissolve the objective of Cognitive Radio Network. Efficient and secure authentication of Primary Users (PU) is an only solution to mitigate Primary User Emulation Attack but most of the mechanisms designed for this are either complex or make changes to the spectrum. Here, we proposed a mechanism to authenticate Primary Users in Cognitive Radio Network which is neither complex nor make any changes to spectrum. The proposed mechanism is secure and also has improved the performance of the Cognitive Radio Network substantially. |
URL | https://ieeexplore.ieee.org/document/8554610 |
DOI | 10.1109/ICACCI.2018.8554610 |
Citation Key | hussain_primary_2018 |
- pregenerated hash digest
- telecommunication security
- sensors
- Resiliency
- resilience
- radio networks
- PUEA
- pubcrawl
- primary user emulation attack
- primary user authentication
- authentication
- node authentication
- emulation
- Cryptography
- CRN
- Cognitive Radio Security
- Cognitive Radio Network
- cognitive radio
- Base stations