Authentication scheme to combat a primary user emulation attack against cognitive radio users.
Jayapalan AvilaKaruppusamy ThenmozhiPublished in: Secur. Commun. Networks (2015)
Keyphrases
- authentication scheme
- user authentication
- user centric
- cognitive radio
- user interface
- secret key
- user interaction
- end users
- cognitive radio networks
- user experience
- authentication protocol
- smart card
- spectrum sensing
- location information
- wireless communication
- communication systems
- distributed databases
- wireless networks