{"title":"基于自定义哈希函数的认知无线网络数字签名和认证机制","authors":"John N. Soliman, T. A. Mageed, H. El-Hennawy","doi":"10.1109/ICCES.2017.8275299","DOIUrl":null,"url":null,"abstract":"Wireless technologies, applications and services have been witnessed a rapid growth in the past few years, due to this development, spectrum scarcity and shortage has become a major concern, several spectrum portions of the static allocated licensed bands are under-utilized. Cognitive radio networks (CRNs) are considered to be the most promising solution in improving the spectrum utilization and solving the spectrum scarcity by providing licensed spectrum portions to unlicensed users, however due to nature of these networks, CRNs are exposed to different types of threats and attacks from different malicious users, which can affect the network availability and performance, in this paper a proposed authentication mechanisms and digital signature scheme applied using new customized hash function for CRNs, the proposed model simulated and tested to provide both primary and secondary users data authentication, data integrity and non-repudiation in CRNs, achieving a defend strategy from the well-known attacks that could be launched by malicious, selfish users, threats and vulnerabilities in CRNs.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Digital signature and authentication mechanisms using new customized hash function for cognitive radio networks\",\"authors\":\"John N. Soliman, T. A. Mageed, H. El-Hennawy\",\"doi\":\"10.1109/ICCES.2017.8275299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless technologies, applications and services have been witnessed a rapid growth in the past few years, due to this development, spectrum scarcity and shortage has become a major concern, several spectrum portions of the static allocated licensed bands are under-utilized. Cognitive radio networks (CRNs) are considered to be the most promising solution in improving the spectrum utilization and solving the spectrum scarcity by providing licensed spectrum portions to unlicensed users, however due to nature of these networks, CRNs are exposed to different types of threats and attacks from different malicious users, which can affect the network availability and performance, in this paper a proposed authentication mechanisms and digital signature scheme applied using new customized hash function for CRNs, the proposed model simulated and tested to provide both primary and secondary users data authentication, data integrity and non-repudiation in CRNs, achieving a defend strategy from the well-known attacks that could be launched by malicious, selfish users, threats and vulnerabilities in CRNs.\",\"PeriodicalId\":170532,\"journal\":{\"name\":\"2017 12th International Conference on Computer Engineering and Systems (ICCES)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 12th International Conference on Computer Engineering and Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2017.8275299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2017.8275299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital signature and authentication mechanisms using new customized hash function for cognitive radio networks
Wireless technologies, applications and services have been witnessed a rapid growth in the past few years, due to this development, spectrum scarcity and shortage has become a major concern, several spectrum portions of the static allocated licensed bands are under-utilized. Cognitive radio networks (CRNs) are considered to be the most promising solution in improving the spectrum utilization and solving the spectrum scarcity by providing licensed spectrum portions to unlicensed users, however due to nature of these networks, CRNs are exposed to different types of threats and attacks from different malicious users, which can affect the network availability and performance, in this paper a proposed authentication mechanisms and digital signature scheme applied using new customized hash function for CRNs, the proposed model simulated and tested to provide both primary and secondary users data authentication, data integrity and non-repudiation in CRNs, achieving a defend strategy from the well-known attacks that could be launched by malicious, selfish users, threats and vulnerabilities in CRNs.