Skip to main navigation Skip to search Skip to main content

A secure MAC protocol for Cognitive Radio Networks (SMCRN)

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In addition to standard authentication and data confidentiality requirements, Cognitive Radio Networks (CRNs) face distinct security issues such as primary user emulation and spectrum management attacks. A compromise of these will result in a denial of service, eavesdropping, forgery, or replay attack. These attacks must be considered while designing a secure media access control (MAC) protocol for CR networks. This paper presents a novel secure CR MAC protocol: the presented protocol is analysed for these security measures using formal logic methods such as Burrows-Abadi-Needham (BAN) logic. It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequent secure communication.
Original languageEnglish
Title of host publication2013 Science and Information Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9780989319300
Publication statusPublished - 14 Nov 2013
Event2013 Science and Information Conference - London
Duration: 7 Oct 20139 Oct 2013

Conference

Conference2013 Science and Information Conference
CityLondon
Period7/10/139/10/13
Other2013 Science and Information Conference (07/10/2013-09/10/2013, London)

Keywords

  • Cognitive radio

Fingerprint

Dive into the research topics of 'A secure MAC protocol for Cognitive Radio Networks (SMCRN)'. Together they form a unique fingerprint.

Cite this