z-logo
Premium
IDsMA: An integrated digital signature and mutual authentication mechanism for securing the cognitive radio networks
Author(s) -
Balamurugan S. Appavualias,
Kumar S. Senthil
Publication year - 2020
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4289
Subject(s) - computer science , cognitive radio , computer network , quality of service , enodeb , encryption , mutual authentication , reliability (semiconductor) , digital signature , secure communication , authentication (law) , hash function , computer security , password , wireless , telecommunications , user equipment , base station , power (physics) , physics , quantum mechanics
Summary Enabling a reliable and secure communication in cognitive radio networks (CRNs) is one of the interesting and demanding research areas and these days, it is used in wide range of applications. The traditional works mainly aimed to improve the spectrum efficiency and bandwidth utilization of the CRN. Moreover, it focused on attack detection in the network for improving the reliability. Thus, this work intended to secure the CRN by considering the objectives of both attack detection and quality of service (QoS) improvement. For this purpose, an integrated digital signature and mutual authentication (IDsMA) mechanism is proposed in this paper, which incorporates the benefits of both security and reliability. Also, the Rivest‐Sharmir‐Adlemann (RSA) algorithm is utilized to encrypt and decrypt the data at the transmitter and receiver side. Here, the unique user ID is generated by the service eNodeB based on the hash function, which is validated at the server side for validating the authenticity of the user. Furthermore, the particle swarm optimization (PSO) and relevant vector machine (RVM) techniques are utilized for optimal channel selection and attack classification. The simulation results evaluate the performance of the proposed technique by using various performance measures. Also, its superiority is proved by comparing the proposed technique with the existing techniques .

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here