Entity authenticating system and method of cognitive radio network based on hierarchical structure

A technology of cognitive radio and authentication system, which is applied in the field of entity authentication system, can solve problems such as not considering spectrum switching and the impact of scheme efficiency, and achieve the effect of preventing denial of service attacks and congestion, and reducing authentication delay

Inactive Publication Date: 2010-10-13
UNIV OF SCI & TECH BEIJING
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Since the problem of frequent spectrum switching in cognitive radio networks is not considered, the authentication delay of this type of entity authentication scheme will have a great impact on the efficiency of the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity authenticating system and method of cognitive radio network based on hierarchical structure
  • Entity authenticating system and method of cognitive radio network based on hierarchical structure
  • Entity authenticating system and method of cognitive radio network based on hierarchical structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Below in conjunction with example the present invention will be further described.

[0029] Such as figure 1 The entity authentication system and method authentication system based on the hierarchical structure cognitive radio network of the present invention is an authentication system diagram based on the layered architecture. Computers and mobile phones represent secondary users, and each sub-base station is directly connected to a database except the main base station Used to store digital certificates. The digital certificate includes a public key, user identification code and encrypted information. The main task of the main base station is to connect all sub-base stations and access the main network, such as the Internet or other cognitive radio networks. There is a unique wireless link between each sub-base station and the main base station to exchange data, and the main base station is connected to other cognitive radio networks. Therefore, the authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides entity authenticating system and method of a cognitive radio network, which relates to the relevant applying field in information safety technology. The entity authenticating system and the method of the cognitive radio network based on a hierarchical structure ensure the safe communication between secondary users by authenticating the identities of the secondary users in the cognitive radio network. In the process of sending the authentication request by the secondary user, the credibility is judged, and the public key verification is allowed to further execute only in the premise that the condition is satisfied. The trusting mechanism can effectively prevent the malignant users from generating multiple attacks in the network. The safety is based on n RSA algorithm, and simultaneously the symmetrical keys and the public key system are combined. In the premise of ensuring that the authenticating safety is not decreased, the authenticating efficiency is greatly enhanced, thereby effectively decreasing the authenticating delay. In addition, the invention has obvious effects on the safety problems of preventing the reproducing attack, controlling network congestion and the like.

Description

technical field [0001] The present invention relates to the application field of cognitive radio network security in information security technology, in particular to an entity authentication system and a method thereof based on a layered cognitive radio network. Background technique [0002] Cognitive radio users have to continuously access and exit the cognitive radio network during the communication process, so the topology of the network changes dynamically. In a cognitive radio network, the service quality of secondary users and primary users should be basically the same, but their service permissions are different in priority. This makes the cognitive radio network more complex, and it is more difficult to effectively control the operation of the entire network, leaving more opportunities for the opponent. The network faces the following security issues: [0003] (1) Dynamic changes of network topology and members: Due to the random access and exit of nodes, the topo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W48/08H04W12/041
Inventor 周贤伟王超吴华怡郭继文
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products