计算机科学 ›› 2010, Vol. 37 ›› Issue (6): 94-96.

• 计算机网络与信息安全 • 上一篇    下一篇

基于自认证的认知无线电密钥交换协议研究

周健,周贤伟,孙丽艳   

  1. (北京科技大学信息工程学院 北京100081);(安徽财经大学信息工程学院 蚌埠233041)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金资助项目(60773074),国家863计划项目(2007AA01Z213,2009AA01Z209),安徽省高等学校自然科学研究项目(KJ2009B127Z),安徽省高校优秀青年人才基金项目(2009SQRZ084)资助。

Key-exchange Protocols of Cognitive Radio Based on Self-certified

ZHOU Jian,ZHOU Xian-wei,SUN Li-yan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 开放频谱策略使得认知无线电网络面临比传统网络更为复杂的安全威胁。频谱切换引发时延,降低认知无线电网络密钥交换协议的性能。为解决这一问题,提出一种适合认知无线电网络的密钥交换协议,在分簇基础上根据切换时延使用旅行商问题和组播路由树提高簇内和簇间路径选择效率。簇间和簇内使用基于自认证的多方密钥交换协议,不仅可以防止被动攻击,也可以阻止主动攻击,保证认证和密钥协商同步进行,其运行效率为O(2m),m为簇中节点数量。

关键词: 认知无线电,安全,密钥交换,分簇,Ad hoc,自认证

Abstract: There are more security threats in cognitive radio networks than traditional wireless networks due to the strategy of opening spectrum. Switching spectrum brings time delay and interferes with network efficiency. The question also adversely effects on key-exchange protocol which is an important part of key agreement, and gives malicious nodes the attack chance. So this paper put forward a new method, firstly cognitive radio network was divided into multiple clusters, secondly used protocol the time delay of switching channel to select the optimal path with traveling salesman problem in cluster and built the optimal multicast routing tree among clusters; at last different key-exchange protocols based on self-certified were used in cluster and among clusters, which can prevent active attack and passive attack, authentication and key agreement can also simultaneously carried out. The efficiency of protocol is O(2m),m is the number of cluster.

Key words: Cognitive radio, Security, Key exchange, Cluster, Ad hoc, Self-certified

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!