Download now Free registration required
Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this paper, the authors propose a primary user authentication scheme in the presence of attackers. Their system is based on the deployment of multiple stages of "Helper" nodes, helper nodes in the first stage are fixed and close to primary user, while helper nodes in the next stages are placed within the primary user's coverage area.
- Format: PDF
- Size: 654.38 KB