Abstract
Abstract-Web exchanges are conducted through an open network that lacks central management; it is,
therefore, impossible to identify a communication partner, especially in a distributed system. Authentication
is the basis of security in such systems. Providing secure communication becomes problematic in CRN
because cognitive node can join and leave network dynamically that leading to be many threats targeting
this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN
logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential,
and can it be used in cognitive radio networks.
therefore, impossible to identify a communication partner, especially in a distributed system. Authentication
is the basis of security in such systems. Providing secure communication becomes problematic in CRN
because cognitive node can join and leave network dynamically that leading to be many threats targeting
this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN
logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential,
and can it be used in cognitive radio networks.
Keywords
Cognitive radio network; BAN logic; security;