AUTHENTICATION OF CRNS BY USING BAN LOGIC
- Hits: 1082
Volume 2 (2), December 2019, Pages 141-157
Israa N. Alsalhi, Salah A. Albermany
In broadband wireless communications, one of the main problems facing it is the limited availability of the spectrum needed to provide high-speed telecommunications services at any time and anywhere, since all radio frequencies are being reserved for different communications systems. Accordingly, a cognitive radio network (CRN) proposal was proposed to solve the problem of the limited spectrum by enhancing the overall spectrum utilization and provide an adequate spectrum for broadband wireless communications. Despite the different methods of protection used in CRNs, they may be exposed to external attacks and to provide security, we will have a high-security protocol analysis using BAN logic. BAN logic is used to analyze the protocol using to authentication; In this paper, we offer the highest protection in the contact against various attacks. We are using authentication of the ElGamal algorithm and analysis via BAN logic to show if it is achieving the authentication and secure communication to be used in CRN.
Cognitive Radio Network, BAN Logic, Security, Spectrum Sharing, authentication, protocol, ElGamal
Abadi, M., & Tuttle, M. R. (1991, August). A semantics for a logic of authentication. In PODC (Vol. 91, pp. 201-216).
Alhakami, W., Mansour, A., Safdar, G. A., & Albermany, S. (2013, October). A secure MAC protocol for cognitive radio networks (SMCRN). In 2013 Science and Information Conference (pp. 796-803). IEEE.
Bhandari, S., & Moh, S. (2015). A survey of MAC protocols for cognitive radio body area networks. Sensors, 15(4), 9189-9209.
Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426(1871), 233-271.
Butt, M. A. (2013). Cognitive radio network: Security enhancements. Journal of Global Research in Computer Science, 4(2), 36-41.
Clancy, T. C., & Goergen, N. (2008, May). Security in cognitive radio networks: Threats and mitigation. In 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008) (pp. 1-8). IEEE.
Elkashlan, M., Wang, L., Duong, T. Q., Karagiannidis, G. K., & Nallanathan, A. (2014). On the security of cognitive radio networks. IEEE Transactions on Vehicular Technology, 64(8), 3790-3795.
Idoudi, H., Daimi, K., & Saed, M. (2014, July). Security challenges in cognitive radio networks. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 2-4).
Mishra, V., Mathew, J., & Lau, C. T. (2016). QoS and Energy Management in Cognitive Radio Network: Case Study Approach. Springer.
Mitola, J. I. (2002). Cognitive radio. An integrated agent architecture for software defined radio.
Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: making software radios more personal. IEEE personal communications, 6(4), 13-18.
Parvin, S., Han, S., Tian, B., & Hussain, F. K. (2010, December). Trust-based authentication for secure communication in cognitive radio networks. In 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (pp. 589-596). IEEE.
Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708.
Reddy, Y. B. (2013, June). Security issues and threats in cognitive radio networks. In The ninth advanced international conference on telecommunications (AICT 2013) (pp. 84-89).
Stallings, W. (2017). Cryptography and network security: principles and practice (pp. 92-95). Upper Saddle River: Pearson
Syverson, P., & Cervesato, I. (2000, September). The logic of authentication protocols. In International School on Foundations of Security Analysis and Design (pp. 63-137). Springer, Berlin, Heidelberg.
Tang, L., & Wu, J. (2012). Research and analysis on cognitive radio network security. Wireless Sensor Network, 4(04), 120.
Thakre, S., & Dixit, S. (2014). Security Threats and Detection Technique in Cognitive radio Network. International Journal of Emerging Technology and Advanced Engineering, 4(2).
Tsai, J. L., Lo, N. W., & Wu, T. C. (2012). Secure delegation-based authentication protocol for wireless roaming service. IEEE Communications Letters, 16(7), 1100-1102.
Wessels, J., & BV, C. F. (2001). Application of BAN-logic. CMG FINANCE BV, 19, 1-23.
Wong, K. H., Zheng, Y., Cao, J., & Wang, S. (2006, June). A dynamic user authentication scheme for wireless sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06) (Vol. 1, pp. 8-pp). IEEE.
Xingliang, Z., & Shilian, X. (2012, October). A new authentication scheme for Wireless Ad Hoc Network. In 2012 International Conference on Information Management, Innovation Management and Industrial Engineering (Vol. 2, pp. 312-315). IEEE.
Zhang, N., Lu, N., Cheng, N., Mark, J. W., & Shen, X. S. (2013). Cooperative spectrum access towards secure information transfer for CRNs. IEEE Journal on Selected Areas in Communications, 31(11), 2453-2464.