{"title":"Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks","authors":"Sharareh Vizvari, R. Berangi, Khosrow Nematollahi","doi":"10.1109/KBEI.2015.7436032","DOIUrl":null,"url":null,"abstract":"Because of the inherent ability such as higher sensitivity for primary user signals, and unknown location of primary receiver, Cognitive Radio (CR) networks is at risk more than other wireless networks. Considering the growing demand of radio spectrum, the need to larger scale database and wider range of coverage, we proposed to exploit the mobile phone database for authentication and authorization processes. To achieve this goal the Universal Mobile Telecommunication System Authentication and Key Agreement (UMTS AKA) protocol in 3G mobile network has been used. The mentioned protocol not only intends to solve the structural and security problems of UMTS AKA. But also, prevents disclosure of shared temporary key between Cognitive Base Station (CBS) and mobile by using SIM card features.","PeriodicalId":168295,"journal":{"name":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KBEI.2015.7436032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Because of the inherent ability such as higher sensitivity for primary user signals, and unknown location of primary receiver, Cognitive Radio (CR) networks is at risk more than other wireless networks. Considering the growing demand of radio spectrum, the need to larger scale database and wider range of coverage, we proposed to exploit the mobile phone database for authentication and authorization processes. To achieve this goal the Universal Mobile Telecommunication System Authentication and Key Agreement (UMTS AKA) protocol in 3G mobile network has been used. The mentioned protocol not only intends to solve the structural and security problems of UMTS AKA. But also, prevents disclosure of shared temporary key between Cognitive Base Station (CBS) and mobile by using SIM card features.