LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING LABYRINTHINE AUTHENTICATION FORMULA

Authors

  • Fawad Salam Khan Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Talha Naqash Department of Computer Science, Bahria University Islamabad, Pakistan
  • Muhammad Ibrar Khatak Department of Computer Science, Bahria University Islamabad, Pakistan
  • Raja Masood Larik Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia

DOI:

https://doi.org/10.11113/jt.v76.2860

Keywords:

Cognitive radio network, authentication, security

Abstract

Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. Effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. Usage of licensed spectrum is increasing day by day so Cognitive Radio is proposed as a solution to meet the demands. CR is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. In this paper, we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. Anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. The conceivable results incorporate coordinating the benefits of spread range balance, utilizing encryption calculations (Encryption keys), and its possibility to switch over different recurrence groups. We concentrate on the different requisitions of CR and the various philosophies which empower a safe Communication system. 

References

R. Pal, et al. 2008. Characterizing Reliability In Cognitive Radio Networks. First International Symposium on Applied Sciences on Biomedical and Communication Technologies, 2008. 1-6, 25-28 Oct.

E. Trigui et al. 2013. A Mobility Scheme for Cognitive Radio Networks. 12th Annual Mediterranean of Ad Hoc Networking Workshop (MED-HOC-NET), 2013. 102: 24-26 June.

V. Marojevic, et al. 2007. Integrated Resource Management in Cognitive Radio. 16th IST on Mobile and Wireless Communications Summit, 2007. 1(5): 1-5 July.

J. Mitola III, 2000. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, Swedish Royal Institute of Technology.

S. Ball, A. Ferguson, and T. W. Rondeau. 2005. Consumer Applications of Cognitive Radio Defined Networks. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySpan’05. 518-525, Nov.

A. Gorcin and H. Arslan. 2008. Public Safety and Emergency Case Communications: Opportunities from the Aspect of Cognitive Radio. 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. 1-10, Oct.

A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. 2011. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks. IEEE Transactions on Signal Processing. 59: 774-786.

S. Liu, Q. Liu, J. Gao, and J. Guan. 2011. Attacker-exclusion Scheme for Cooperative Spectrum Sensing Against SSDF Attacks Based On Accumulated Suspicious Level. IEEE International Conference on Cyber Technology in Automation. Control, and Intelligent Systems (CYBER). 239-243.

A. G. Fragkiadakis, et al. 2013. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Communications Surveys & Tutorials. 15(1): 428-445.

L. Duan, A. W. Min, J. Huang, and K. G. Shin. 2012. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications. 30: 1658-1665.

R. E. Ziemer. 2007. Fundamentals of Spread Spectrum Modulation, Colorado Springs: Morgan & Claypool Publishers.

A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. 2010. Countering Byzantine Attacks in Cognitive Radio Networks. IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). 3098-3101.

S. Haykin, D. J. Thomson, and J. H. Reed. 2009. Spectrum Sensing for Cognitive Radio. Proceedings of the IEEE. 97: 849-877.

L. Freitas, Y. Pires, J. Morais, J. Costa, and A. Klautau. 2012. Data Mining Applied to Cognitive Radio Systems.

C. N. Mathur and K. Subbalakshmi. 2007. Digital signatures for centralized DSA networks. Proc. First IEEE Workshop on Cognitive Radio Net- works, CCNC), Las Vegas, NE, Jan. 11.

Y.-C. Liang, H.-H. Chen, J. Mitolla III, P. Mahonen, R. Kohno and J. H. Reed. 2008. Cognitive Radio: Theory and Applications. IEEE Journal on Selected Areas in Communications. 26(1): Jan.

C. Ghosh. 2009. Innovative Approaches to Spectrum Selection, Sensing, and Sharing in Cognitive Radio Networks, PhD Thesis, University of Cincinnati, May.

Downloads

Published

2015-08-25

Issue

Section

Science and Engineering

How to Cite

LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING LABYRINTHINE AUTHENTICATION FORMULA. (2015). Jurnal Teknologi (Sciences & Engineering), 76(1). https://doi.org/10.11113/jt.v76.2860