A Hybrid Encryption Protocol Based on AES and RSA for Implementation in Cognitive Radio Networks
Keywords:
Authentication; Cognitive Radio; Protocol; Security; Cryptography; AES; RSAAbstract
Cognitive radio networks are intelligent networks that can sense the environment and adapt the
communication parameters accordingly. These networks find their applications in co-existence of different wireless
networks, interference mitigation, and dynamic spectrum access. Unlike traditional wireless networks, cognitive radio
networks additionally have their own set of unique security threats and challenges, suchasselfish misbehaviors, selfcoexistence, license user emulation and attacks on spectrum managers; accordingly the security protocols developed for
these networks must have abilities to counter these attacks. This paper presents a novel cognitive authentication
protocol, called CoG-Auth, aimed to provide security in cognitive radio networks against threats to self-co-existence.
CoG-Authdoes not require presence of any resource enriched base stations or centralized certification authorities, thus
enabling it to be applicable to both infrastructure and ad hoc cognitive radio networks. The CoG-Authdesign employs
key hierarchy; such as temporary keys, partial keys and session keys to fulfill the fundamental requirements of security.
In this authentication we are going to implement a hybrid encryption algorithm using AES and RSA. By implementing
this hybrid algorithm for CoG- Authwe are going to achieve lesscomputational intensive, high performance, more secure
and successful authentication and transmissionrate.