This paper is published in Volume-2, Issue-3, 2016
Area
Network and Communications
Author
Mehakpreet Kaur, Navleen Kaur
Org/Univ
CEC Landran, Mohali, India
Pub. Date
13 June, 2016
Paper ID
V2I3-1166
Publisher

Citationsacebook

IEEE
Mehakpreet Kaur, Navleen Kaur. Adaptive Security Mechanism for Cognitive Radio Communications based on Robust Authentication, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Mehakpreet Kaur, Navleen Kaur (2016). Adaptive Security Mechanism for Cognitive Radio Communications based on Robust Authentication. International Journal of Advance Research, Ideas and Innovations in Technology, 2(3) www.IJARIIT.com.

MLA
Mehakpreet Kaur, Navleen Kaur. "Adaptive Security Mechanism for Cognitive Radio Communications based on Robust Authentication." International Journal of Advance Research, Ideas and Innovations in Technology 2.3 (2016). www.IJARIIT.com.

Abstract

Abstract—The fundamental techniques for cognitive radio standard generates the new security threats and the primary operative issues and challenges to wireless communications. Spectrum occupancy failure, the policy management failures, wireless node localization failures, transceiver failures, framework problems and other concerns must be efficiently covered and resolved while imposing the security techniques over the cognitive channels. In the process, it will produce the security threats-primary user emulation attacks. When the attacker has detected the idle spectrum, he will send out a signal similar to the primary user’s signal in this band. The attacks will affect the secondary user detect the idle spectrum and the spectrum cannot be used effectively. An attacker occupies the unused channels by emitting a signal with similar form as the primary user’s signal so as to prevent other secondary users from accessing the vacant frequency bands. The performance of the proposed security model for cognitive radio channels would be evaluated in the performance parameters of security packet volume, authentication delay, security system overhead, etc. The trust and authentication based proposed model will be designed to offer the robust security level over the cognitive channel.