Trust-Based Authentication for Secure Communication in Cognitive Radio Networks

Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, th...

Full description

Bibliographic Details
Main Authors: Parvin, Sazia, Han, Song, Tian, Biming, Hussain, Farookh Khadeer
Other Authors: Jiannong Cao
Format: Conference Paper
Published: IEEE 2010
Subjects:
Online Access:http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95
http://hdl.handle.net/20.500.11937/16807
_version_ 1848749282684829696
author Parvin, Sazia
Han, Song
Tian, Biming
Hussain, Farookh Khadeer
author2 Jiannong Cao
author_facet Jiannong Cao
Parvin, Sazia
Han, Song
Tian, Biming
Hussain, Farookh Khadeer
author_sort Parvin, Sazia
building Curtin Institutional Repository
collection Online Access
description Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof.
first_indexed 2025-11-14T07:18:28Z
format Conference Paper
id curtin-20.500.11937-16807
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T07:18:28Z
publishDate 2010
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-168072023-01-13T07:56:29Z Trust-Based Authentication for Secure Communication in Cognitive Radio Networks Parvin, Sazia Han, Song Tian, Biming Hussain, Farookh Khadeer Jiannong Cao Lui Sha cognitive radio networks Trust authentication primary user secure radio secondary user Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof. 2010 Conference Paper http://hdl.handle.net/20.500.11937/16807 http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 IEEE fulltext
spellingShingle cognitive radio networks
Trust
authentication
primary user
secure
radio
secondary user
Parvin, Sazia
Han, Song
Tian, Biming
Hussain, Farookh Khadeer
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title_full Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title_fullStr Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title_full_unstemmed Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title_short Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
title_sort trust-based authentication for secure communication in cognitive radio networks
topic cognitive radio networks
Trust
authentication
primary user
secure
radio
secondary user
url http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95
http://hdl.handle.net/20.500.11937/16807