A Novel Authentication Mechanism for Cognitive Radio Network
B.Sarala1, S.Rukmani Devi2, M.Suganthy3, S.Jhansi Ida4
1B.Sarala, Assistant Professor, Dept. of ECE R.M.K. Engineering College, Kavaraipettai.
2S.Rukumani Devi, Professor, Dept. of ECE R.M.D. Engineering College, Kavaraipettai.
3M.Suganthy, Associate Professor, Dept. of ECE Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi
4S.Jhansi Ida, Assistant Professor, Dept. of IT, R.M.K. Engineering College, Kavaraipettai.

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 713-718 | Volume-8 Issue-4, November 2019. | Retrieval Number: D6499118419/2019©BEIESP | DOI: 10.35940/ijrte.D6499.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: By employing an efficient authentication protocol the security of the Cognitive radio Network can be upgraded. This paper portrays a strategy for recognizing the Primary client Emulation Attacks in a CRN using cross layer approach. A few kinds of attacks have been discussed in this paper and an authentication scheme to detect PUEA has been presented. It is identified that the physical layer authentication method can serve as a faster authentication method but with low accuracy in detection.And a cryptography based authentication protocol can serve as a slower authentication method but with high accuracy in detection. In this paper a cross layer confirmation plot that joins both the physical and higher layer authentication is defined. The proposed method can provide good accuracy in detection without sacrificing the speed of the detection.A detecting procedure to detect PUEA in a CRN for a single user has been defined in this paper.
Keywords: Cognitive Radio Network, Authentication, Cross Layer Authentication.
Scope of the Article: Authentication, Authorization, Accounting.