A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios

被引:9
作者
Kuroda, Masahiro [1 ]
Nomura, Ritsu [2 ]
Trappe, Wade [3 ]
机构
[1] Natl Inst Informat & Commun Technol, 3-4 Hikarino Oka, Kanagawa 2390847, Japan
[2] Mitsubishi Electr Corp, Publ USe Syst Dept, Kanagawa 2390847, Japan
[3] Rutgers State Univ, Wireless Informat Network Lab, Piscataway, NJ 08855 USA
来源
2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2 | 2007年
关键词
cognitive radio; authentication protocol; location information; wireless security; EAP; key management; DoS attack; carousel;
D O I
10.1109/SAHCN.2007.4292819
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Securing future wireless networks will be a critical challenge as the popularity of mobile communications implies that wireless networks will be the target of abuse. The next generation of wireless networks, as envisioned by recent advances in cognitive radio (CR) technologies, will be autonomic and able to adjust their configuration to changes in the communication environment. Unfortunately, the authentication frameworks for various radio technologies, such as IEEE802.11 and 802.16, are quite different from one another and, in order to support radio reconfiguration, it is necessary to devise an appropriate authentication framework for CR systems. In this paper, we propose a radio-independent authentication protocol for CRs that is independent of the underlying radio protocols and able to support EAP transport. The re-keying protocol assumes user-specific information, such as location information, as a key seed. The keys for authentication and encryption are derived from the historical location registry of a mobile terminal. The keys are frequently updated as mobile users, position varies. After discussing authentication issues for CR networks, radio-independent authentication via location information, and application to EAP transport, we evaluate the confidentiality of the key management method and its integration with EAP, thereby supporting the effectiveness of our key management method for CR networks.
引用
收藏
页码:70 / +
页数:2
相关论文
共 18 条
[1]  
*3GPP TS, 2004, 33102V55 3GPP TS
[2]  
ABOBA B, 1999, RFC2716 IETF
[3]  
AKYILDIZ F, 2001, IEEE PERSONAL CO OCT, V8, P18
[4]  
AONO T, P 2004 IEICE GEN C
[5]   Your 802.11 wireless network has no clothes [J].
Arbaugh, WA ;
Shankar, N ;
Wan, YCJ ;
Zhang, K .
IEEE WIRELESS COMMUNICATIONS, 2002, 9 (06) :44-51
[6]  
Bangolae S., 2006, P 2006 INT C WIRELES, P737, DOI 10.1145/1143549.1143696
[7]  
CORDEIRO C, 2005, 80222 IEEE, P328
[8]  
HARADA H, 2005, SOFTWARE DEFINED RAD, P539
[9]  
HAVERINEN H, 2006, RFC4186 IETF
[10]  
JOHNSON DOMINIC D.P., 2004, OVERVIEW IEEE80216 S, P40