Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 524

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

KBEI02_107

تاریخ نمایه سازی: 5 بهمن 1395

Abstract:

Because of the inherent ability such as higher sensitivity for primary user signals, and unknown location of primary receiver, Cognitive Radio (CR) networks is at risk more than other wireless networks. Considering the growing demand of radio spectrum, the need to larger scale database and wider range of coverage, we proposed to exploit the mobile phone database for authentication and authorization processes. To achieve this goal the Universal Mobile Telecommunication System Authentication and Key Agreement (UMTS AKA) protocol in 3G mobile network has been used. The mentioned protocol not only intends to solve the structural and security problems of UMTS AKA. But also, prevents disclosure of shared temporary key between Cognitive Base Station (CBS) and mobile by using SIM card features

Keywords:

Cognitive radio , Authentication Protocol and AKA Key Agreement , Confidentiality , Security , UMTS

Authors

Sharareh Vizvari

Dept. Computer Engineering Iran University of science and Technology Tehran, Iran

Reza Berangi

Dept. Computer Engineering Iran University of science and Technology Tehran, Iran

Khosro Nematollahi

Dept. Computer Engineering Rozbahan University of Sari Sari, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Y.-L. Huang, C.-Y. Shen, and S. W. Shieh, "S-AKA: A ...
  • L. Zhu and H. Mao, "Research on authentication mechanism of ...
  • L. Zhu and H. Mao, _ efficient authentication mechanism fr ...
  • Y. Zhou, D. Wu, and S. M. Nettles, "On the ...
  • novel security algorithm for Aء" [4] M. Naveed Akhtar and ...
  • L. Law, A. Menezes, M Qu, J. Solinas, and S. ...
  • Copyright Notice is: 978-1 -4673 -6506-2/15/831 _ 00 C2015 IEEE ...
  • نمایش کامل مراجع