Trust Based Security for Cognitive Radio Networks
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs)...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
ACM
2010
|
| Subjects: | |
| Online Access: | http://doi.acm.org/10.1145/1967486.1967605 http://hdl.handle.net/20.500.11937/15015 |
| _version_ | 1848748779610570752 |
|---|---|
| author | Parvin, Sazia Han, Song Hussain, Farookh Khadeer Al Faruque, M. |
| author2 | Gabriele Kotsis |
| author_facet | Gabriele Kotsis Parvin, Sazia Han, Song Hussain, Farookh Khadeer Al Faruque, M. |
| author_sort | Parvin, Sazia |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs), secure communication in CRNs becomes more critical than for other conventional Wireless networks. So, in this paper we propose a trust-based security solution for CRNs. Trust is calculated from the requesting node depending on various communication attributes and the evaluated trust is compared with the trust threshold value. Depending on the resultant decision, the requested service is available to the requesting user. We prove the security of our proposed scheme in terms of security analysis. |
| first_indexed | 2025-11-14T07:10:28Z |
| format | Conference Paper |
| id | curtin-20.500.11937-15015 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:10:28Z |
| publishDate | 2010 |
| publisher | ACM |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-150152023-01-13T07:56:29Z Trust Based Security for Cognitive Radio Networks Parvin, Sazia Han, Song Hussain, Farookh Khadeer Al Faruque, M. Gabriele Kotsis David Taniar Eric Pardede Imad Saleh Ismail Khalil Security Primary Users Trust Cognitive Radio Networks Secondary Users With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs), secure communication in CRNs becomes more critical than for other conventional Wireless networks. So, in this paper we propose a trust-based security solution for CRNs. Trust is calculated from the requesting node depending on various communication attributes and the evaluated trust is compared with the trust threshold value. Depending on the resultant decision, the requested service is available to the requesting user. We prove the security of our proposed scheme in terms of security analysis. 2010 Conference Paper http://hdl.handle.net/20.500.11937/15015 http://doi.acm.org/10.1145/1967486.1967605 ACM restricted |
| spellingShingle | Security Primary Users Trust Cognitive Radio Networks Secondary Users Parvin, Sazia Han, Song Hussain, Farookh Khadeer Al Faruque, M. Trust Based Security for Cognitive Radio Networks |
| title | Trust Based Security for Cognitive Radio Networks |
| title_full | Trust Based Security for Cognitive Radio Networks |
| title_fullStr | Trust Based Security for Cognitive Radio Networks |
| title_full_unstemmed | Trust Based Security for Cognitive Radio Networks |
| title_short | Trust Based Security for Cognitive Radio Networks |
| title_sort | trust based security for cognitive radio networks |
| topic | Security Primary Users Trust Cognitive Radio Networks Secondary Users |
| url | http://doi.acm.org/10.1145/1967486.1967605 http://hdl.handle.net/20.500.11937/15015 |