Abstract
Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks
Highlights
The concept of cognitive radio (CR) was first presented by J
It is a new approach in wireless communications that Mitola later described in his doctoral dissertation [2].CR, which is built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and uses the methodology of understanding by building to learn from the environment and adapt to statistical variations in the input stimuli [3] [4].The two main aims of cognitive radio are: highly reliable communication whenever and wherever needed, and efficient utilization of the radio spectrum [5]
CR is a novel concept because there were several problems in the wireless communication system
Summary
The concept of CR was first presented by J. A logic for analyzing authentication protocols (BAN logic) which is a logic of belief with special features for determining some of the central authentication concepts has been proposed by Burrows, Abadi, and Needham[10]. With this logic, several errors in the published protocols have been revealed[11]. In various branches of modern theoretical computing, the graphs and other objects derived from authentication processes are basic essential tools actively deployed in network security [13]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.