Show simple item record

dc.contributor.authorParvin, Sazia
dc.contributor.authorHan, Song
dc.contributor.authorTian, Biming
dc.contributor.authorHussain, Farookh Khadeer
dc.contributor.editorJiannong Cao
dc.contributor.editorLui Sha
dc.date.accessioned2017-01-30T11:57:52Z
dc.date.available2017-01-30T11:57:52Z
dc.date.created2011-03-14T20:01:40Z
dc.date.issued2010
dc.identifier.citationParvin, Sazia and Han, Song and Tian, Biming and Hussain, Farookh Khadeer. 2010. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks, in Cao, J. and Sha, L. (ed), 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), Dec 11 2010, pp. 589-596. Hong Kong: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/16807
dc.description.abstract

Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof.

dc.publisherIEEE
dc.relation.urihttp://doi.ieeecomputersociety.org/10.1109/EUC.2010.95
dc.subjectcognitive radio networks
dc.subjectTrust
dc.subjectauthentication
dc.subjectprimary user
dc.subjectsecure
dc.subjectradio
dc.subjectsecondary user
dc.titleTrust-Based Authentication for Secure Communication in Cognitive Radio Networks
dc.typeConference Paper
dcterms.source.startPage589
dcterms.source.endPage596
dcterms.source.titleProceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010)
dcterms.source.seriesProceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010)
dcterms.source.isbn9780769543222
dcterms.source.conference2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010)
dcterms.source.conference-start-dateDec 11 2010
dcterms.source.conferencelocationHong Kong
dcterms.source.placeHong Kong
curtin.note

Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentDigital Ecosystems and Business Intelligence Institute (DEBII)
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record