期刊文献+

基于自认证的认知无线电密钥交换协议研究 被引量:5

Key-exchange Protocols of Cognitive Radio Based on Self-certified
在线阅读 下载PDF
导出
摘要 开放频谱策略使得认知无线电网络面临比传统网络更为复杂的安全威胁。频谱切换引发时延,降低认知无线电网络密钥交换协议的性能。为解决这一问题,提出一种适合认知无线电网络的密钥交换协议,在分簇基础上根据切换时延使用旅行商问题和组播路由树提高簇内和簇间路径选择效率。簇间和簇内使用基于自认证的多方密钥交换协议,不仅可以防止被动攻击,也可以阻止主动攻击,保证认证和密钥协商同步进行,其运行效率为O(2m),m为簇中节点数量。 There are more security threats in cognitive radio networks than traditional wireless networks due to the strategy of opening spectrum. Switching spectrum brings time delay and interferes with network efficiency. The question also adversely effects on key-exchange protocol which is an important part of key agreement, and gives rnalieious nodes the attack chance. So this paper put forward a new method, firstly cognitive radio network was divided into multiple clusters,secondly used protocol the time delay of switching channel to select the optimal path with traveling salesman problem in cluster and built the optimal multicast routing tree among clusters; at last different key-exchange protocols based on self-certified were used in cluster and among clusters, which can prevent active attack and passive attack, authentication and key agreement can also simultaneously carried out. The efficiency of protocol is O(2m) ,m is the number of cluster.
出处 《计算机科学》 CSCD 北大核心 2010年第6期94-96,共3页 Computer Science
基金 国家自然科学基金资助项目(60773074) 国家863计划项目(2007AA01Z213 2009AA01Z209) 安徽省高等学校自然科学研究项目(KJ2009B127Z) 安徽省高校优秀青年人才基金项目(2009SQRZ084)资助
关键词 认知无线电 安全 密钥交换 分簇 AD HOC 自认证 Cognitive radio, Security, Key exchange, Cluster, Ad hoe, Self-certified
  • 相关文献

参考文献13

  • 1Mitola J, Maguire G. Cognitive radio: making software radios more personal[J]. IEEE Personal Commun, 1999,6(4) : 13-18.
  • 2Akyildiz I F, Lee W, Vuran M C, et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey[J]. Computer Networks J, 2006,50(13) : 2127-2159.
  • 3Cormiob C, Chowdhurya K R. A survey on MAC protocols for cognitive radio network[J]. Ad Hoc Networks. Elsevier B. V. 2009,7(7) :1315-1329.
  • 4Zhao Q, Tong L, Swami A, et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMPD framework [J]. IEEE Journal on Selected Areas in Communications ( JSAC), 2007,25 ( 11 ) : 589-600.
  • 5Su H, Zhang X. Opportunistic MAC protocols for cognitive radio based wireless networks[A] //Proceedings of the 41st IEEE CISS Conference, 2007[C]. Baltimore, MD: IEEE Information Sciences and Systems, 2007 : 363-368.
  • 6Brodersen R W,Wolisz A, Cabric D, et al. Corvus: a cognitive radio approach for usage of virtual unlicensed spectrum [R]. Berkeley: Wireless Research Center (BWRC) White paper, 2004.
  • 7Aad I, Hubaux J-P, Knightly E W. Denial of service resilience in ad hoc networks[A]//Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (Mobi- Com'04), 2004 [C]. Philadelphia, PA, USA: ACM New York, NY,USA, 2004: 202-215.
  • 8Mathur C N, Subbalakshmi K P. Security Issues in Cognitive Radio Networks[C]//Kwang-Cheng Chen, Ramjee Prasad. Cognitive Networks. Oxford: Wiley, 2007: 272-290.
  • 9Joux A. An One Round Protocol for Tripartite Diffie-Hellman [A]//Algorithmic Number Theory-proceedings of ANTS, 2000 [C]. Heidelberg: Springer-Verlag, 2000: 385-394.
  • 10Menzes A,Qu M,Vanstone S. Some New Key Agreement Protocols Providing Mutual Implicit Authentication[A]//Selected Area in Cryptography-proceedings of SAC, 1995 [C]. Nashville, TN, 1995:22-32.

同被引文献82

  • 1周贤伟,孟潭,王丽娜,张雪松,李超.认知无线电研究综述[J].电讯技术,2006,46(6):1-6. 被引量:17
  • 2Zhao,Y,Gaeddert,J,Bae,K.K,Reed,J.H.Radio environment map-enabled situation-aware cognitive radio learning algorithms. proceedings of Software Defined Radio (SDR)Technical Conference . 2006
  • 3Hanif,M.F,Smith,P.J,Shafi,M.Performance of cognitive radio systems with imperfect radio environment map information. Communications Theory Workshop . 2009
  • 4Zhao,Y,Gaeddert,J,Morales,L,Bae,K,Um,J.S,Reed,J.H.Development of radio environment map enabled case and knowledge-based learning algorithms for IEEE802.22WRAN cognitive engines. Proceeding of2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications . 2007
  • 5ZHAO Y,REED J H,MAO S,et al.Overhead analysis for REM-enabled CR networks. Proc.first IEEE Workshop on Networking Technologies for Software Defined Radio Networks . 2006
  • 6Chen, R,Park, J. M,Hou, Y. T,Reed, J. H.Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine . 2008
  • 7ZHAO Y,REED J H,MAO S,et al.Overhead analysis for REM-enabled CR networks. Proc.first IEEE Workshop on Networking Technologies for Software Defined Radio Networks . 2006
  • 8ZHAO Youping,MORALES L,GAEDDERT J,et al.Applying radio environment maps to cognitive wireless regional area networks. Proc.New Frontiers in Dynamic Spectrum Access Networks . 2007
  • 9Mitola J.Cognitive Radio for Flexible Mobile Multimedia Communications. Proceedings of the 6th IEEE International Workshop on Mobile Multimedia Communication . 1999
  • 10徐明成.计算机信息安全教程[M]北京:电子工业出版社,200850-52.

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部