This paper presents a new method for mutual authentication in centralized cognitive radio networks. In doing so, we analyzed the proposed scheme in terms of security and performance. As for security, we analyzed the proposed scheme from a mathematical standpoint, validated the authentication method using automated validation of Internet security protocols and applications, provided formal verification using the BAN logic, and demonstrated the resistance of the propounded model against different attacks. The performance analysis considered the cost of computation, costs of storage and communication, and also the number of cryptographic operations. This scheme has some advantages over the existing methods: First, it uses the existing and free facilities in the physical layer and medium access control and does not need independent resources; second, the proposed scheme enjoys a high speed because its operations work at the hardware level with less computational complexity compared with the conventional methods; third, the proposed model is well consistent with the underlying conditions in radio environments and is resistant against relevant attacks; and fourth, unlike the conventional methods, it provides quantum resistance, and its security is based on the hardness of the shortest vector problem in lattices.