Skip to main content
Robust Asynchronous Authentication Protocol for Secure Cognitive Spectrum Sharing
European Journal of Scientific Research (2014)
  • Fatty Salem
  • Maged Ibrahim, Helwan University
  • I. Ibrahim
Cognitive Radio is a regulated technique for opportunistic access of idle resources and it is expected that the golden service of spectrum sharing to be achieved via the TV white space. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist the system misuses. In this paper, to prevent Primary User Emulation attack, we propose an authentication protocol based on the deployment of multiple stages of stationary “helper” nodes. Helper nodes are serving as bridges, they can detect the presence of the primary user, and enable secondary users to verify the cryptographic signatures included in their signals. However, we propose to distinguish each TV tower with a unique ID to be used to prevent wormhole attack asynchronously. We also illustrate the secure interactions between cognitive radio’s entities to solve the problem of replay and wormhole attacks, and Byzantine failures problem.
  • Cognitive Radio Networks,
  • Primary User Emulation,
  • Wormhole Attack,
  • Byzantine Failures
Publication Date
February, 2014
Citation Information
Fatty Salem, Maged Ibrahim and I. Ibrahim. "Robust Asynchronous Authentication Protocol for Secure Cognitive Spectrum Sharing" European Journal of Scientific Research (2014)
Available at: