In addition to standard authentication and data confidentiality requirements, Cognitive Radio Networks (CRNs) face distinct security issues such as primary user emulation and spectrum management attacks. A compromise of these will result in a denial of service, eavesdropping, forgery, or replay attack. These attacks must be considered while designing a secure media access control (MAC) protocol for CR networks. This paper presents a novel secure CR MAC protocol: the presented protocol is analysed for these security measures using formal logic methods such as Burrows-Abadi-Needham (BAN) logic. It is shown that the proposed protocol functions effectively to provide strong authentication and detection against malicious users leading to subsequ...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
as a smart and intelligent technology to address the problem of spectrum scarcity and its under-util...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based co...
A thesis submitted in partial fulfilment for the degree of Doctor of PhilosophyWith the rapid increa...
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand....
According to the recent development, we look forward to further widespread use of wireless networks ...
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improvi...
Abstract—Cognitive Radio (CR) is a promising technology for opportunistically accessing underutilize...
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a dema...
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a tech...
Abstract: A cognitive radio (CR) is a radio that can change its transmission parameters based on the...
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a prom...
Cognitive radio networks are intelligent networks that can sense the environment and adapt the commu...
Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-o...
Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowin...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
as a smart and intelligent technology to address the problem of spectrum scarcity and its under-util...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based co...
A thesis submitted in partial fulfilment for the degree of Doctor of PhilosophyWith the rapid increa...
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand....
According to the recent development, we look forward to further widespread use of wireless networks ...
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improvi...
Abstract—Cognitive Radio (CR) is a promising technology for opportunistically accessing underutilize...
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a dema...
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a tech...
Abstract: A cognitive radio (CR) is a radio that can change its transmission parameters based on the...
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a prom...
Cognitive radio networks are intelligent networks that can sense the environment and adapt the commu...
Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-o...
Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowin...
The increasing emergence of wireless applications along with the static spectrum allocation followed...
as a smart and intelligent technology to address the problem of spectrum scarcity and its under-util...
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based co...