Abstract

During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the secondary users to vacate the occupied channel, which may stop the communication. In this work, we propose a new cryptographic-based algorithm, CRAES (Cognitive Radio-Advanced Encryption Standard), inspired by the traditional AES to secure the CRN. The data of the primary and secondary users is encrypted at the transmitter and decrypted at the receiver. Unlike the conventional AES, we introduce the data-dependent key-generation and shift-rows process. We also reduce the rounds of AES from 10-6 to improve the computational efficiency without compromising the overall security. The experimental results demonstrate the effectiveness of the proposed CR-AES in terms of better security, reliability, and computational efficiency.

Highlights

  • During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization

  • We propose a new cryptographic-based approach, CR-AES, inspired by the conventional AES

  • 3.2 New Shift Rows Transformation In CR-AES, we propose a new shift row transformation where the input data rows are shifted according to an 8-bit shift vector which contains the last byte of previous data

Read more

Summary

INTRODUCTION

Tthe emergence of new wireless technologies and related applications such as ad-hoc networks, the internet of things, generation networks, etc. On the arrival of the primary user, the secondary user has to vacate the occupied slot and switch to another vacant space (hole) In this way, the problem of scarce spectrum resources is efficiently resolved [1]. The security of CRN is affected by numerous threats that arise due to sharing of spectrum between primary and secondary users. These threats may cause the DoS (Denial of Services), bandwidth wastage, data modification, connection loss, and interference for the primary users in CRN. The proposed algorithm reduces the computational efficiency by reducing the rounds of AES without compromising the overall security of system

ADVANCED ENCRYPTION STANDARD
Substitute Bytes Transformation
Shift Rows Transformations
COGNITIVE RADIO-ADVANCED ENCRYPTION STANDARD
New Key Generation Process
New Shift Rows Transformation
EXPERIMENTAL RESULTS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.