Title: A novel common control channel security framework for cognitive radio networks

Authors: G.A. Safdar; M. O'Neill

Addresses: Department of Computer Science and Technology, University of Bedfordshire, Park Square, Luton, Bedfordshire LU1 3JU, UK ' ECIT, Queen's University Belfast, Northern Ireland Science Park, Queen's Road, Queen's Island, Belfast BT3 9DT, UK

Abstract: Cognitive radio technology makes use of the underutilised spectrum opportunistically without causing interference to the primary users. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to perform free channel announcements, channel selection and channel reservation before any actual data transmission. Common control channel security is vital in order to ensure security in the subsequent communication among the cognitive radio nodes. Additional to well-known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as misbehaviours in spectrum sensing, licensed user emulation and attacks in the common control channel transactions. This paper presents a novel common control channel security framework (protocol) for cooperatively communicating cognitive radio networks. To the best of the authors knowledge, this is the first paper to address the security requirements of the common control channel. An implementation of the proposed security protocol is discussed illustrating how two cognitive radio nodes can authenticate each other prior to any confidential common control channel negotiations. The protocol is formally validated by GNY logic and a security analysis of the protocol illustrates that it meets the principal security requirements of authentication, confidentiality, integrity and non-repudiation.

Keywords: cognitive radios; control channel security; common control channels; authentication protocols; framework; cognitive radio networks; cognitive radio MAC; medium access control; cooperative communications; confidentiality; integrity; non-repudiation.

DOI: 10.1504/IJAACS.2012.046281

International Journal of Autonomous and Adaptive Communications Systems, 2012 Vol.5 No.2, pp.125 - 145

Published online: 05 Dec 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article