Skip to main content

Authentication of Primary User at Physical Layer Through Approximation in Cognitive Radio

  • Conference paper
  • First Online:
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Abstract

Cognitive Radio (CR) is a mechanism that adjusts its radio parameters dynamically to use the unoccupied spectrum holes so as to overcome the problem of spectrum shortage arose due to enormously increasing wireless devices. It is done by assigning free spectrum to the unlicensed users without compromising the licensed users. Hence, distinguishing Primary Users (PUs) from Secondary Users (SUs) is a major concern in CRN and it becomes more challenging when it has to be done at the physical layer, without understanding the data in the signals. Here, we propose a mechanism to authenticate a PU based upon approximation of distance and angle of arrival of the signal received from it. We also propose a mechanism where a SU can be hopped to Dedicated Control Channel (DCCH) for seamless communication, when it has to vacate the spectrum for PU and there are no traffic channels (TCH) to continue its ongoing communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cabric, D., Mishra, S., Willkomm, D., Brodersen, R., Wolisz, A.: A cognitive radio approach for usage of virtual unlicensed spectrum. In: Proceedings IST Mobile and Wireless Communications Summit, Dresden, Germany (2009)

    Google Scholar 

  2. Parvin, S., Hussain, F.K., Hussain, O.K., Han, S., Tian, B., Chang, E.: Cognitive radio network security: a survey. J. Netw. Comput. Appl. 35, 1691–1708 (2012)

    Article  Google Scholar 

  3. Akan, O.B., Karli, O.B., Ergul, O.: Cognitive radio sensor networks. IEEE J. New. 23(4), 34–40 (2009)

    Google Scholar 

  4. Akyildiz, I.F., et al.: A survey on spectrum management in cognitive radio networks. IEEE Commun. Mag. 46(4), 40–48 (2008)

    Article  Google Scholar 

  5. Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. IEEE Int. Conf. High Perform. Comput. Commun. 10, 1036–1041 (2008)

    Google Scholar 

  6. Zhu, L., Mao, H.: Research on authentication mechanism of cognitive radio networks based on certification authority. In: Computational Intelligence and Software Engineering (CiSE 1–5) (2010)

    Google Scholar 

  7. Liu, Y., Ning, P., Dai, H.: Authenticating primary users signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: Proceedings of IEEE Symposium on Security and Privacy (2010)

    Google Scholar 

  8. Kim, H.S.: Location-based authentication protocol for first cognitive radio networking standard. J. Netw. Comput. Appl. 34(4), 1160–1167 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

Authors gratefully acknowledge the support offered by Dr. Garimella Rama Murthy, IIITH and also the resources provided by the Department of Computer Science and Engineering at Central University of Rajasthan, Kishangarh to complete this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muzzammil Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Muzzammil Hussain, Suditi Choudhary (2016). Authentication of Primary User at Physical Layer Through Approximation in Cognitive Radio. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_33

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_33

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics