Location-based authentication protocol for first cognitive radio networking standard
نویسنده
چکیده
The developing IEEE 802.22 standard will allow broadband access to be provided in sparsely populated areas by using cognitive radio techniques with operations on a non-interfering basis over television broadcast bands. Such non-interfering basis operation will increase the efficiency of utilisation of that spectrum, and provide large economic and societal benefits. However, the security mechanisms supported by IEEE 802.22 security sub-layer are insufficient to ensure robust security due to the fact that the designers of the standard attempted to reuse the security sub-layer designed for IEEE 802.16 networks, which does not consider the unique security features from IEEE 802.22 networks. This paper proposes a location-based authentication protocol for IEEE 802.22, which can be integrated with the extensible authentication protocol. The proposed protocol uses location information as a key factor to be authenticated each other. Furthermore, it could provide the privacy and confidentiality. & 2010 Elsevier Ltd. All rights reserved.
منابع مشابه
End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks
Recent Federal Communications Commission rules promise a whole new set of possible applications, which allow unlicensed use on a secondary basis of the Television White Spaces (TVWS), called as cognitive radio technology. ECMA-International launched the first step towards realizing these applications by creating and adopting industry standards. This paper reviews the first industrial standards ...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملReliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive Radio Networks
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectrum sensing. Although the operational aspects of REM-enabled CR network are being studied actively, its security aspects have attracted very little attention. In this paper, we identify the security threats and propose g...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Network and Computer Applications
دوره 34 شماره
صفحات -
تاریخ انتشار 2011