Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.1.33

Privacy Aware Authentication Protocol for Cognitive Radio Networks  

Kim, Hyun-Sung (Kyungil University)
Abstract
Recently, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio is a technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. Kuroda et al. proposed a radio-independent authentication protocol for cognitive radio networks. This paper first shows the privacy weaknesses in the authentication protocol by Kuroda et al. and proposes a privacy aware authentication protocol to solve the weaknesses.
Keywords
IEEE 802.22; Cognitive radio network; Authentication protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE 802.22, "Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications: Policies and Procedures for Operation in the TV Bands," IEEE P802.22-D1.0, 2008.
2 T. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," Proc. of CrownCom 2008, pp. 456-464, May 2008.
3 고광진, 박창현, 송명선, 엄중선, 유성진, 임선민, 정회윤, 황성현, "TV White Spaces에서의 CR 기술 동향," 전자통신동향분석, 24(3), pp. 91-102, 2009년 6월.
4 R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on selected areas in communications, vol. 26, no. 7, pp. 25-37, Jan. 2008.   DOI
5 R. Nomura, M. Kuroda, and D. Inoue, "Location-based Key Management for Ubiquitous Wireless Network," IWS 2005/WPMC'05, pp. 51-55, Sep. 2005.
6 J. Mitola and G. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.   DOI   ScienceOn
7 IEEE 802 ECSG on WS, "Security Tutorial," IEEE 802ECSGonWS-09/ 0045r01, 2009.
8 D. Wright, S. Gutwirth, M. Friedewald, P.D. Hert, M. Langheinrich, and A. Moscibroda, "Privacy, trust and policy-making:Challenges and responses," Computer Law & Security Report, vol. 25, no. 1, pp. 69-83, 2009.   DOI   ScienceOn
9 J. Mitola, "Cognitive radio for flexible mobile multimedia communications," Proc. of IEEE Workshop on Mobile Multimedia Comm., pp. 3-10, 1999.
10 J.L. Burbank, "Security in cognitive radio networks : the required evolution in approaches to wireless network security," Proc. of CrownCom 2008, pp. 1-7, May 2008.
11 M. Kuroda, R. Nomura, and W. Trappe, "A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios," Proc. of SECON'07, pp. 70-79, June 2007.
12 D. Stanley, J. Walker, and B. Aboba, "EAP Method Requirements for Wireless LANs," RFC 4017, Mar. 2005.
13 FCC, ET Docket No. 08-260, Second Report and Order and Memorandum Opinion and Order, Nov. 2008.
14 T.C. Clancy and N. Goergen, "Security in cognitive radio networks : threats and mitigation," Proc. of CrownCom 2008, pp. 1-8, May 2008.
15 IEEE 802.22, "Recommended Text for Security in 802.22," IEEE 802.22-08/0174r17, 2009.