TY - GEN
T1 - A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios
AU - Kuroda, Masahiro
AU - Nomurcr, Ritsu
AU - Trappe, Wade
PY - 2007
Y1 - 2007
N2 - Securing future wireless networks will be a critical challenge as the popularity of mobile communications implies that wireless networks will be the target of abuse. The next generation of wireless networks, as envisioned by recent advances in cognitive radio (CR) technologies, will be autonomic and able to adjust their configuration to changes in the communication environment. Unfortunately, the authentication frameworks for various radio technologies, such as IEEE802.11 and 802.16, are quite different from one another and, in order to support radio reconfiguration, it is necessary to devise an appropriate authentication framework for CR systems. In this paper, we propose a radio-independent authentication protocol for CRs that is independent of the underlying radio protocols and able to support EAP transport. The re-keying protocol assumes user-specific information, such as location information, as a key seed. The keys for authentication and encryption are derived from the historical location registry of a mobile terminal. The keys are frequently updated as mobile users' position varies. After discussing authentication issues for CR networks, radio-independent authentication via location information, and application to EAP transport, we evaluate the confidentiality of the key management method and its integration with EAP, thereby supporting the effectiveness of our key management method for CR networks.
AB - Securing future wireless networks will be a critical challenge as the popularity of mobile communications implies that wireless networks will be the target of abuse. The next generation of wireless networks, as envisioned by recent advances in cognitive radio (CR) technologies, will be autonomic and able to adjust their configuration to changes in the communication environment. Unfortunately, the authentication frameworks for various radio technologies, such as IEEE802.11 and 802.16, are quite different from one another and, in order to support radio reconfiguration, it is necessary to devise an appropriate authentication framework for CR systems. In this paper, we propose a radio-independent authentication protocol for CRs that is independent of the underlying radio protocols and able to support EAP transport. The re-keying protocol assumes user-specific information, such as location information, as a key seed. The keys for authentication and encryption are derived from the historical location registry of a mobile terminal. The keys are frequently updated as mobile users' position varies. After discussing authentication issues for CR networks, radio-independent authentication via location information, and application to EAP transport, we evaluate the confidentiality of the key management method and its integration with EAP, thereby supporting the effectiveness of our key management method for CR networks.
KW - Authentication protocol
KW - Carousel
KW - Cognitive radio
KW - DoS attack
KW - EAP
KW - Key management
KW - Location information
KW - Wireless security
UR - https://www.scopus.com/pages/publications/48049106004
UR - https://www.scopus.com/pages/publications/48049106004#tab=citedBy
U2 - 10.1109/SAHCN.2007.4292819
DO - 10.1109/SAHCN.2007.4292819
M3 - Conference contribution
AN - SCOPUS:48049106004
SN - 1424412684
SN - 9781424412686
T3 - 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON
SP - 70
EP - 79
BT - 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON
T2 - 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON
Y2 - 18 June 2007 through 21 June 2007
ER -