Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
dc.contributor.author | Parvin, Sazia | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Hussain, Farookh Khadeer | |
dc.contributor.editor | Jiannong Cao | |
dc.contributor.editor | Lui Sha | |
dc.date.accessioned | 2017-01-30T11:57:52Z | |
dc.date.available | 2017-01-30T11:57:52Z | |
dc.date.created | 2011-03-14T20:01:40Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Parvin, Sazia and Han, Song and Tian, Biming and Hussain, Farookh Khadeer. 2010. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks, in Cao, J. and Sha, L. (ed), 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), Dec 11 2010, pp. 589-596. Hong Kong: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/16807 | |
dc.description.abstract |
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof. | |
dc.publisher | IEEE | |
dc.relation.uri | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 | |
dc.subject | cognitive radio networks | |
dc.subject | Trust | |
dc.subject | authentication | |
dc.subject | primary user | |
dc.subject | secure | |
dc.subject | radio | |
dc.subject | secondary user | |
dc.title | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks | |
dc.type | Conference Paper | |
dcterms.source.startPage | 589 | |
dcterms.source.endPage | 596 | |
dcterms.source.title | Proceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010) | |
dcterms.source.series | Proceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010) | |
dcterms.source.isbn | 9780769543222 | |
dcterms.source.conference | 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010) | |
dcterms.source.conference-start-date | Dec 11 2010 | |
dcterms.source.conferencelocation | Hong Kong | |
dcterms.source.place | Hong Kong | |
curtin.note |
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Digital Ecosystems and Business Intelligence Institute (DEBII) | |
curtin.accessStatus | Open access |