Jul 4, 2017 · In this paper, a two-level authentication scheme for communication in a CRN is proposed. Before joining the network, a CR node is validated by ...
Authentication is a primary security property in wireless networks wherein the identity of a cognitive node is verified before providing access to available ...
Wireless security in cognitive radio network (CRN) is a challenging technical area due to the dynamic and unique characteristics of CRNs. As a cognitive node ...
Aug 22, 2017 · His current research is in the various aspects of cognitive radio networks including security, authentication, and routing management.
Authentication is a primary security property in wireless networks wherein the identity of a cognitive node is verified before providing access to available ...
A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks. Authors. Mahmoud Khasawneh · Anjali Agarwal. Publication date: 4 July 2017.
... Public key Cryptography (PKC) has also been employed to implement security in CR networks. An authentication protocol based on PKC is presented in [20]; ...
Nov 30, 2019 · Abstract—By employing an efficient authentication protocol the security of the Cognitive radio Network can be upgraded. This.
Abstract—Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards ...
People also ask
What are the types of authentication in network security?
What are the spectrum sensing techniques in cognitive radio networks a survey?
Related papers. A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks · Mahmoud Khasawneh. IEEE Access, 2017. downloadDownload ...