2019
DOI: 10.1002/dac.4289
|View full text |Cite
|
Sign up to set email alerts
|

IDsMA: An integrated digital signature and mutual authentication mechanism for securing the cognitive radio networks

Abstract: Summary Enabling a reliable and secure communication in cognitive radio networks (CRNs) is one of the interesting and demanding research areas and these days, it is used in wide range of applications. The traditional works mainly aimed to improve the spectrum efficiency and bandwidth utilization of the CRN. Moreover, it focused on attack detection in the network for improving the reliability. Thus, this work intended to secure the CRN by considering the objectives of both attack detection and quality of servic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…PDTGVs can obtain smooth regions and discontinuities at the object boundaries. PDTGVs remove the staircasing artifacts produced by the TV (Ahmed et al, 2012;Balamurugan et al, 2019;Nguyen et al, 2018). Based on TV algorithms, bring staircasing artifacts in which that are absent when working with PDTGV exponential model.…”
Section: Related Workmentioning
confidence: 99%
“…PDTGVs can obtain smooth regions and discontinuities at the object boundaries. PDTGVs remove the staircasing artifacts produced by the TV (Ahmed et al, 2012;Balamurugan et al, 2019;Nguyen et al, 2018). Based on TV algorithms, bring staircasing artifacts in which that are absent when working with PDTGV exponential model.…”
Section: Related Workmentioning
confidence: 99%
“…In 5G cognitive radio networks, how to enable secure and trusted communication between transmitters and receivers is highly important. Some learning-based solutions such as PSO may be very useful in the authentication classification and attack verification [163]. In this work, a mutual authentication mechanism is designed where the user identity and real identity are produced by both the transmitter and receiver for authentication validation enabled by a PSO-based access feature selection.…”
Section: Network Authenticationmentioning
confidence: 99%