期刊文献+

基于信任的认知无线电安全认证方案 被引量:1

原文传递
导出
摘要 本文提出一种适合认知无线电网络的安全认证方案,在基于信任机制与REM系统的基础上采用隐藏认证方案提高了抵抗伪造节点攻击与暴力破解攻击的能力。在信任机制中,本文设计了评判参数与信任向量公式,公式的结果代表了各个节点的信任等级。如果信任等级评估过低将启动隐藏认证方案,此方案中将认证信息随机嵌入到冗余信息中,如果没有时间戳生成器将无法知道信息隐藏的位置与具体内容,因此解决了伪造节点攻击、暴力破解攻击与密钥泄露攻击。
出处 《保密科学技术》 2011年第10期60-64,共5页 Secrecy Science and Technology
  • 相关文献

参考文献11

  • 1孙丽艳,周健.一种多信道Ad hoc认知无线电网络密钥交互协议[J].计算机应用研究,2011,28(1):335-337. 被引量:2
  • 2周健,周贤伟,孙丽艳.基于自认证的认知无线电密钥交换协议研究[J].计算机科学,2010,37(6):94-96. 被引量:5
  • 3周贤伟,辛晓瑜,王丽娜,薛楠.认知无线电安全关键技术研究[J].电信科学,2008,24(2):72-77. 被引量:18
  • 4Zhao,Y,Gaeddert,J,Bae,K.K,Reed,J.H.Radio environment map-enabled situation-aware cognitive radio learning algorithms. proceedings of Software Defined Radio (SDR)Technical Conference . 2006
  • 5Hanif,M.F,Smith,P.J,Shafi,M.Performance of cognitive radio systems with imperfect radio environment map information. Communications Theory Workshop . 2009
  • 6Zhao,Y,Gaeddert,J,Morales,L,Bae,K,Um,J.S,Reed,J.H.Development of radio environment map enabled case and knowledge-based learning algorithms for IEEE802.22WRAN cognitive engines. Proceeding of2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications . 2007
  • 7ZHAO Y,REED J H,MAO S,et al.Overhead analysis for REM-enabled CR networks. Proc.first IEEE Workshop on Networking Technologies for Software Defined Radio Networks . 2006
  • 8Chen, R,Park, J. M,Hou, Y. T,Reed, J. H.Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine . 2008
  • 9ZHAO Y,REED J H,MAO S,et al.Overhead analysis for REM-enabled CR networks. Proc.first IEEE Workshop on Networking Technologies for Software Defined Radio Networks . 2006
  • 10ZHAO Youping,MORALES L,GAEDDERT J,et al.Applying radio environment maps to cognitive wireless regional area networks. Proc.New Frontiers in Dynamic Spectrum Access Networks . 2007

二级参考文献40

  • 1郭彩丽,张天魁,曾志民,冯春燕.认知无线电关键技术及应用的研究现状[J].电信科学,2006,22(8):50-55. 被引量:33
  • 2Mitola J, Maguire G. Cognitive radio: making software radios more personal[J]. IEEE Personal Commun, 1999,6(4) : 13-18.
  • 3Akyildiz I F, Lee W, Vuran M C, et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey[J]. Computer Networks J, 2006,50(13) : 2127-2159.
  • 4Cormiob C, Chowdhurya K R. A survey on MAC protocols for cognitive radio network[J]. Ad Hoc Networks. Elsevier B. V. 2009,7(7) :1315-1329.
  • 5Zhao Q, Tong L, Swami A, et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMPD framework [J]. IEEE Journal on Selected Areas in Communications ( JSAC), 2007,25 ( 11 ) : 589-600.
  • 6Su H, Zhang X. Opportunistic MAC protocols for cognitive radio based wireless networks[A] //Proceedings of the 41st IEEE CISS Conference, 2007[C]. Baltimore, MD: IEEE Information Sciences and Systems, 2007 : 363-368.
  • 7Brodersen R W,Wolisz A, Cabric D, et al. Corvus: a cognitive radio approach for usage of virtual unlicensed spectrum [R]. Berkeley: Wireless Research Center (BWRC) White paper, 2004.
  • 8Aad I, Hubaux J-P, Knightly E W. Denial of service resilience in ad hoc networks[A]//Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (Mobi- Com'04), 2004 [C]. Philadelphia, PA, USA: ACM New York, NY,USA, 2004: 202-215.
  • 9Mathur C N, Subbalakshmi K P. Security Issues in Cognitive Radio Networks[C]//Kwang-Cheng Chen, Ramjee Prasad. Cognitive Networks. Oxford: Wiley, 2007: 272-290.
  • 10Joux A. An One Round Protocol for Tripartite Diffie-Hellman [A]//Algorithmic Number Theory-proceedings of ANTS, 2000 [C]. Heidelberg: Springer-Verlag, 2000: 385-394.

共引文献19

同被引文献13

  • 1Federal Communication Commission,Government Printing Office,Washington.First report and order: Revision of part 15 of the commission’ s rules regarding ultra-wideband transmission system. ET-Docket 98-153 . 2002
  • 2李红宁.认知无线电安全性研究[D].西安电子科技大学.2010
  • 3Nie Nie,Cristina Comaniciu.Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks[J].Mobile Networks and Applications.2006(6)
  • 4Dandawate A V,Giannakis G B.Statistical tests for presence of cyclostationarity[].IEEE Transactions on Signal Processing.1994
  • 5H.Arslan,Z.N.Chen,M.-G.Di Benedetto.UWB Wireless Communications[]..2006
  • 6Robert W Brodersen,Wolisz adam,Cabric danijela,Mubaraq shridhar Mishra,Daniel Willkomm.CORVUS: a cognitive radio approach for usage of virtual unlicensed spectrum[].July.292004
  • 7Simon Haykin.Cognitive radio:research challenges[]..
  • 8H.Urkowitz.Energy detectionofunknowndeterministic signals[].Proceeding of IEEE.1967
  • 9W.A.Gardner,G.Zivanovic.Degree of cyclostationary andtheir application to signal detectionandestimation[].Signal Processing.1991
  • 10G.Dimitrakopoulos,P.Demestichas,D.Grandblaise,K.J.Hoffmeyers,J.Luo.CognitiveRadio,Spectrum and RadioResource Management[].WirelessWorldResearch Forum.2004

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部