Computer Science ›› 2013, Vol. 40 ›› Issue (2): 71-77.
Previous Articles Next Articles
Online:
Published:
Abstract: Aiming at cognitive wireless network security issues and combining with the characteristics of the network,an identity-based security solution named Yu-the II3E scheme was proposed. The solution can realize cognitive node authentication without online trusted third party. Its function is similar with PKI, but certification chain is much simpler than the PKI. This security solution can realize the function of system key distribution, key regularly replace, domain and cross-domain communication with less infrastructure. In addition, this paper compared overall security solution of Yu-IBE with the existing two well-known data integration program. hhe simulation results show that the Yu-IBE program has better stability, and cognitive correct rate has remained relatively high level.
Key words: Cognitive wireless network, Cryptosystem, IBE, PKI
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2013/V40/I2/71
Cited