Abstract
Cognitive Radio (CR) is a mechanism that adjusts its radio parameters dynamically to use the unoccupied spectrum holes so as to overcome the problem of spectrum shortage arose due to enormously increasing wireless devices. It is done by assigning free spectrum to the unlicensed users without compromising the licensed users. Hence, distinguishing Primary Users (PUs) from Secondary Users (SUs) is a major concern in CRN and it becomes more challenging when it has to be done at the physical layer, without understanding the data in the signals. Here, we propose a mechanism to authenticate a PU based upon approximation of distance and angle of arrival of the signal received from it. We also propose a mechanism where a SU can be hopped to Dedicated Control Channel (DCCH) for seamless communication, when it has to vacate the spectrum for PU and there are no traffic channels (TCH) to continue its ongoing communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cabric, D., Mishra, S., Willkomm, D., Brodersen, R., Wolisz, A.: A cognitive radio approach for usage of virtual unlicensed spectrum. In: Proceedings IST Mobile and Wireless Communications Summit, Dresden, Germany (2009)
Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B., Chang, E.: Cognitive radio network security: a survey. J. Netw. Comput. Appl. 35, 1691–1708 (2012)
Akan, O.B., Karli, O.B., Ergul, O.: Cognitive radio sensor networks. IEEE J. New. 23(4), 34–40 (2009)
Akyildiz, I.F., et al.: A survey on spectrum management in cognitive radio networks. IEEE Commun. Mag. 46(4), 40–48 (2008)
Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. IEEE Int. Conf. High Perform. Comput. Commun. 10, 1036–1041 (2008)
Zhu, L., Mao, H.: Research on authentication mechanism of cognitive radio networks based on certification authority. In: Computational Intelligence and Software Engineering (CiSE 1–5) (2010)
Liu, Y., Ning, P., Dai, H.: Authenticating primary users signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: Proceedings of IEEE Symposium on Security and Privacy (2010)
Kim, H.S.: Location-based authentication protocol for first cognitive radio networking standard. J. Netw. Comput. Appl. 34(4), 1160–1167 (2011)
Acknowledgments
Authors gratefully acknowledge the support offered by Dr. Garimella Rama Murthy, IIITH and also the resources provided by the Department of Computer Science and Engineering at Central University of Rajasthan, Kishangarh to complete this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Muzzammil Hussain, Suditi Choudhary (2016). Authentication of Primary User at Physical Layer Through Approximation in Cognitive Radio. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_33
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_33
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)