Title :
Shared-Key Based Secure MAC Protocol for CRNs
Author :
Alhakami, Wajdi ; Mansour, Ayman ; Safdar, Ghazanfar A.
Author_Institution :
Dept. of Comput. Sci. & Technol., Univ. of Bedfordshire, Luton, UK
Abstract :
The unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats such as selfish misbehaviours, primary user emulation and attacks on spectrum managers. A secure MAC protocol is required to maintain the CRNs and operate against the possible threats. This paper is a second generation of the Secure MAC protocol for CRNs (SMCRN) to address the security requirements in CRNs and introduces a novel method based on Shared-key cryptography. The paper mainly presents performance analysis of shared key based SMCRN protocol. The paper also discusses and compares SMCRN for Symmetric and Asymmetric cryptography Techniques. The proposed protocol is analysed and described using the formal Burrows-Abadi-Needham (BAN) logic to prove the protocol operation for addressing the security requirements. Moreover, the implementation of current protocol is provided to compute the overall time over both Common Control Channel (CCC) and data transmission channel.
Keywords :
access protocols; cognitive radio; cryptography; telecommunication security; BAN logic; Burrows-Abadi-Needham; CCC; SMCRN; cognitive radio networks; common control channel; data transmission channel; primary user emulation; secure MAC protocol; security requirements; shared key cryptography; spectrum managers; symmetric and asymmetric cryptography techniques; Authentication; Data communication; Encryption; Protocols; Servers; BAN logic; Cognitive Radio Networks; MAC protocol; Security;
Conference_Titel :
Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on
Conference_Location :
Oxford
Print_ISBN :
978-1-4799-5072-0
DOI :
10.1109/NGMAST.2014.30