earticle

논문검색

End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks

원문정보

초록

영어

Recent Federal Communications Commission rules promise a whole new set of possible applications, which allow unlicensed use on a secondary basis of the Television White Spaces (TVWS), called as cognitive radio technology. ECMA-International launched the first step towards realizing these applications by creating and adopting industry standards. This paper reviews the first industrial standards for personal/portable devices in the TVWS from ECMA-International focused on the security aspects. After that, we point out the lack of security facilities in the standard, which does support the link-to-link security but not for the end-to-end security, and then propose two location-based authentication protocols to cope up with the deficiencies over cognitive radio networks. We use location information as thesecurecredentialfor the authentications. The protocols can be support privacy issues of consumer premise equipments and integrated into the extensible authentication protocol.

목차

Abstract
 1. Introduction
 2. Overview of ECMA-392 Standard
  2.1. Network Architecture
  2.2. Security Mechanism for Link Layer
 3. End-to-End Authentication Protocol
  3.1. Location-based Credential
  3.2. End-to-End Authentication Protocol
 4. Analysis
  4.1. Security Analysis
  4.2. Performance and Functional Analyses
 5. Conclusion
 Acknowledgements
 References

저자정보

  • Hyunsung Kim Dept. of Cyber Security, Kyungil University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.