Authentication of Primary User in Cognitive Radio

نویسندگان

  • Sudesh Gupta
  • Rajesh Nema
  • Puran Gour
چکیده

Cognitive Radio (CR) or soft ware defined radio is a new concept for maximizing the utilization of the radio spectrum. The CR can sense the unused frequency spectrum at any time from the wide range of wireless radio spectrum. This gives the efficient use of radio resources. In cognitive radio environment, a primary licensed user (PU) can share spectrum availability information with a secondary user, the secondary user will then be able to access available frequency spectrum. However, a secondary user should always need to verify the authenticity of the spectrum occupancy information whether it comes from the authentic primary users. Without the verification, a malicious user can give false information about the spectrum occupancy. This can result interference to the primary users and minimize available spectrum for the secondary usage. In this paper, we have develop an efficient technique to verify the source of the spectrum occupancy information is to be from the authentic primary user , by doing this we are maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks

Cognitive radio is one of the main technologies in the wireless communications. The cognitive radio networks are composed of cognitive, spectrum-agile devices which is able to modify their network configurations according to the spectral environment. This cognitive radio provides the chance reusing portions of the spectrum temporarily for the secondary users. But security is a main issue in the...

متن کامل

Primary User Authentication Methods for Mobile Cognitive Radio Networks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 CHAPTER

متن کامل

A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this paper, we propose a primary user authentication scheme in t...

متن کامل

Analysis of Protocols for Spectrum Sensing in Cognitive Radio Networks

Cognitive Radio allows opportunistic spectrum access (OSA) of licensed frequency bands by unlicensed users so as to reduce spectrum scarcity led by the increasing market demands. Spectrum sensing is an essential mechanism for a cognitive radio system. Therefore attention should be given towards the security aspects of spectrum sensing in cognitive radio. This paper analyses the two protocols me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012