Shared-key Based Secure MAC Protocol for CRNs

被引:2
作者
Alhakami, Wajdi [1 ]
Mansour, Ali [1 ]
Safdar, Ghazanfar A. [1 ]
机构
[1] Univ Luton, Dept Comp Sci & Technol, Luton LU1 3JU, Beds, England
来源
2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST) | 2014年
关键词
Cognitive Radio Networks; Security; MAC protocol; BAN logic;
D O I
10.1109/NGMAST.2014.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats such as selfish misbehaviours, primary user emulation and attacks on spectrum managers. A secure Medium Access Control (MAC) protocol is required to maintain the CRNs and operate against the possible threats. This paper is a second generation of the Secure MAC protocol for CRNs (SMCRN) to address the security requirements in CRNs and introduces a novel method based on Shared-key cryptography. The paper mainly presents performance analysis of shared key based SMCRN protocol. The paper also discusses and compares SMCRN for Symmetric and Asymmetric cryptography Techniques. The proposed protocol is analysed and described using the formal Burrows-Abadi-Needham (BAN) logic to prove the protocol operation for addressing the security requirements. Moreover, the implementation of current protocol is provided to compute the overall time over both Common Control Channel (CCC) and data transmission channel.
引用
收藏
页码:266 / 271
页数:6
相关论文
共 16 条
[1]  
Alhakami Wajdi, 2013, 2013 Science and Information Conference (SAI), P796
[2]  
Alhakami W, 2014, IJACSA INT J ADV COM, V5
[3]   A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions [J].
Attar, Alireza ;
Tang, Helen ;
Vasilakos, Athanasios V. ;
Yu, F. Richard ;
Leung, Victor C. M. .
PROCEEDINGS OF THE IEEE, 2012, 100 (12) :3172-3186
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]  
Ci S., 2007, MIL COMM C 2007 MILC, P1
[6]   A Survey on MAC Strategies for Cognitive Radio Networks [J].
De Domenico, Antonio ;
Strinati, Emilio Calvanese ;
Di Benedetto, Maria-Gabriella .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (01) :21-44
[7]  
Guang L, 2006, WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, P116
[8]  
Huayi Wu, 2011, Proceedings of the 2011 International Conference on Internet Computing and Information Services (ICICIS 2011), P353, DOI 10.1109/ICICIS.2011.91
[9]   Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks [J].
Jo, Minho ;
Han, Longzhe ;
Kim, Dohoon ;
In, Hoh Peter .
IEEE NETWORK, 2013, 27 (03) :46-50
[10]  
Li Zhu, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P1110, DOI 10.1109/CSSE.2008.1536