Authentication of RSA via BAN logic
DOI:
https://doi.org/10.31642/JoKMC/2018/060101Keywords:
Cognitive radio network, BAN logic, securit , RSAAbstract
Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networksDownloads
References
J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, 1999. DOI: https://doi.org/10.1109/98.788210
J. Mitola, “Cognitive radio---an integrated agent architecture for software defined radio,” 2000.
S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. areas Commun., vol. 23, no. 2, pp. 201–220, 2005. DOI: https://doi.org/10.1109/JSAC.2004.839380
A. M. Wyglinski, M. Nekovee, and T. Hou, Cognitive radio communications and networks: principles and practice. Academic Press, 2009.
E. Hossain, D. Niyato, and Z. Han, Dynamic spectrum access and management in cognitive radio networks. Cambridge university press, 2009. DOI: https://doi.org/10.1017/CBO9780511609909
S. X. Ting, Z. Z. Hui, and L. Y. Gang, “Spectrum consideration for wireless communications in the twenty first century,” in Environmental Electromagnetics, 2000. CEEM 2000. Proceedings. Asia-Pacific Conference on, 2000, pp. 29–32.
J. T. J. Penttinen, The telecommunications handbook: Engineering guidelines for fixed, mobile and satellite systems. John Wiley & Sons, 2015. DOI: https://doi.org/10.1002/9781118678916
H. F. Rashvand, Using cross-layer techniques for communication systems. IGI Global, 2012. DOI: https://doi.org/10.4018/978-1-4666-0960-0
F. Li, Z. Li, G. Li, F. Dong, and W. Zhang, “Efficient Wideband Spectrum Sensing with Maximal Spectral Efficiency for LEO Mobile Satellite Systems,” Sensors, vol. 17, no. 1, p. 193, 2017. DOI: https://doi.org/10.3390/s17010193
M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 1989, vol. 426, no. 1871, pp. 233–271. DOI: https://doi.org/10.1098/rspa.1989.0125
M. Abadi and M. R. Tuttle, “A semantics for a logic of authentication,” in Proceedings of the tenth annual ACM symposium on Principles of distributed computing, 1991, pp. 201–216. DOI: https://doi.org/10.1145/112600.112618
K. Brauer, “Authentication and security aspects in an international multi-user network,” 2011.
R. Feng, L. Hu, and J. H. Kwak, “Authentication codes and bipartite graphs,” Eur. J. Comb., vol. 29, no. 6, pp. 1473–1482, 2008. DOI: https://doi.org/10.1016/j.ejc.2007.06.013
K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, “A dynamic user authentication scheme for wireless sensor networks,” in Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on, 2006, vol. 1, p. 8–pp.
H.-R. Tseng, R.-H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Global Telecommunications Conference, 2007. GLOBECOM’07. IEEE, 2007, pp. 986–990. DOI: https://doi.org/10.1109/GLOCOM.2007.190
D. Monniaux, “Analysis of cryptographic protocols using logics of belief: an overview,” J. Telecommun. Inf. Technol., pp. 57–67, 2002.
J. Glasgow, G. MacEwen, and P. Panangaden, “A logic for reasoning about security,” ACM Trans. Comput. Syst., vol. 10, no. 3, pp. 226–264, 1992. DOI: https://doi.org/10.1145/146937.146940
G. Coulouris, J. Dollimore, and T. Kindberg, “Archive Material from Edition 2 of Distributed Systems: Concepts and Design,” 1994.
W. Alhakami, A. Mansour, G. A. Safdar, and S. Albermany, “A secure MAC protocol for cognitive radio networks (SMCRN),” in Science and Information Conference (SAI), 2013, 2013, pp. 796–803.
S. Bakhtiari Chehelcheshmeh and M. Hosseinzadeh, “Quantum‐resistance authentication in centralized cognitive radio networks,” Secur. Commun. Networks, vol. 9, no. 10, pp. 1158–1172, 2016. DOI: https://doi.org/10.1002/sec.1408
A. D. Rubin and P. Honeyman, “Formal methods for the analysis of authentication protocols,” Center for Information Technology Integration, 1993.
P. Syverson, “The use of logic in the analysis of cryptographic protocols,” in Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, 1991, pp. 156–170.
S. Older and S.-K. Chin, “Formal methods for assuring security of protocols,” Comput. J., vol. 45, no. 1, pp. 46–54, 2002 DOI: https://doi.org/10.1093/comjnl/45.1.46
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Salah A. K. Albermany, Israa N.A . Alsalhi
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.