Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, th...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE
2010
|
| Subjects: | |
| Online Access: | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 http://hdl.handle.net/20.500.11937/16807 |
| _version_ | 1848749282684829696 |
|---|---|
| author | Parvin, Sazia Han, Song Tian, Biming Hussain, Farookh Khadeer |
| author2 | Jiannong Cao |
| author_facet | Jiannong Cao Parvin, Sazia Han, Song Tian, Biming Hussain, Farookh Khadeer |
| author_sort | Parvin, Sazia |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof. |
| first_indexed | 2025-11-14T07:18:28Z |
| format | Conference Paper |
| id | curtin-20.500.11937-16807 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:18:28Z |
| publishDate | 2010 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-168072023-01-13T07:56:29Z Trust-Based Authentication for Secure Communication in Cognitive Radio Networks Parvin, Sazia Han, Song Tian, Biming Hussain, Farookh Khadeer Jiannong Cao Lui Sha cognitive radio networks Trust authentication primary user secure radio secondary user Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof. 2010 Conference Paper http://hdl.handle.net/20.500.11937/16807 http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 IEEE fulltext |
| spellingShingle | cognitive radio networks Trust authentication primary user secure radio secondary user Parvin, Sazia Han, Song Tian, Biming Hussain, Farookh Khadeer Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title_full | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title_fullStr | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title_full_unstemmed | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title_short | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks |
| title_sort | trust-based authentication for secure communication in cognitive radio networks |
| topic | cognitive radio networks Trust authentication primary user secure radio secondary user |
| url | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 http://hdl.handle.net/20.500.11937/16807 |