For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha...For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.展开更多
Martínez et al.have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography(ECC)combined with a zero knowledge-based authentication scheme.In this paper,we show...Martínez et al.have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography(ECC)combined with a zero knowledge-based authentication scheme.In this paper,we show that this proposed protocol is not secure against the tracking attack.To make the attack successful,the adversary needs to execute three phases.Firstly,the attacker just eavesdrops on the messages exchanged between Reader and Tag.Secondly,the attacker impersonates the Reader to replay the message which is obtained from the first phase.Finally,the adversary acts as a man in the middle to tamper the messages exchanged between Reader and Tag.Then we propose an enhancement and prove that the revision is secure against the tracking attack while keeping other security properties.展开更多
基金the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
文摘For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
基金National Natural Science Foundation of China under Grant No. 60772136,No. 61003300the 111 Development Program of China under Grant No. B08038+1 种基金the Doctoral Fund of Ministry of Education of China under Grant No. 20100203110002the Fundamental Research Funds for the Central Universities under Grant No. JY10000901018, No. JY10000901021, No. JY10000901032, No. JY10000901034,No. 72004985
文摘Martínez et al.have proposed a secure RFID protocol recently which relies exclusively on the use of Elliptic Curve Cryptography(ECC)combined with a zero knowledge-based authentication scheme.In this paper,we show that this proposed protocol is not secure against the tracking attack.To make the attack successful,the adversary needs to execute three phases.Firstly,the attacker just eavesdrops on the messages exchanged between Reader and Tag.Secondly,the attacker impersonates the Reader to replay the message which is obtained from the first phase.Finally,the adversary acts as a man in the middle to tamper the messages exchanged between Reader and Tag.Then we propose an enhancement and prove that the revision is secure against the tracking attack while keeping other security properties.