Abstract
In addition to standard authentication and data confidentiality requirements, Cognitive Radio Networks (CRNs) face distinct security issues such as primary user emulation and spectrum management attacks. A compromise of these will result in a denial of service, eavesdropping, forgery, or replay attack. These attacks must be considered while designing a secure media access control (MAC) protocol for CR networks. This paper presents a novel secure CR MAC protocol: the presented protocol is analysed for these security measures using formal logic methods such as Burrows-Abadi-Needham (BAN) logic. It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequent secure communication.
| Original language | English |
|---|---|
| Title of host publication | 2013 Science and Information Conference |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9780989319300 |
| Publication status | Published - 14 Nov 2013 |
| Event | 2013 Science and Information Conference - London Duration: 7 Oct 2013 → 9 Oct 2013 |
Conference
| Conference | 2013 Science and Information Conference |
|---|---|
| City | London |
| Period | 7/10/13 → 9/10/13 |
| Other | 2013 Science and Information Conference (07/10/2013-09/10/2013, London) |
Keywords
- Cognitive radio
Fingerprint
Dive into the research topics of 'A secure MAC protocol for Cognitive Radio Networks (SMCRN)'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver