Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for guaranteeing security of single-transceiver time-slot type distribution CR MAC (Cognitive Radio Multiple Access Control) protocol

A technology of time slot and protocol security, which is applied in the direction of security devices, electrical components, wireless communication, etc., and can solve problems such as no implementation plan given

Inactive Publication Date: 2010-11-10
UNIV OF SCI & TECH BEIJING
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a cognitive radio network, when a cognitive user withdraws from the primary user in the event of an attack, it may go through several handovers before finally accessing an idle channel, which requires the ability to link several authentication sessions to ensure Overall security, which is also required in the centralized draft of IEEE 802.22, however, the draft does not give a specific implementation plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guaranteeing security of single-transceiver time-slot type distribution CR MAC (Cognitive Radio Multiple Access Control) protocol
  • Method for guaranteeing security of single-transceiver time-slot type distribution CR MAC (Cognitive Radio Multiple Access Control) protocol
  • Method for guaranteeing security of single-transceiver time-slot type distribution CR MAC (Cognitive Radio Multiple Access Control) protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention are further described below with reference to the accompanying drawings.

[0036] When the sender S wants to send data to the receiver R, both parties first generate a random number R respectively S and R R and use the respective H x1 Calculate your own random number n times to get the final value and , where n is large enough. Afterwards, both parties exchange their respective public key certificates and final values. and , for H x1 Validation of all forward values. Public key certificates are only delivered on RC channels.

[0037] Before exiting the current channel for the ith time, S and R will and Encrypted and exchanged with the other party's public key, where is to use H x2 right Calculate the final value after m times, where m is large enough. The above process as image 3 shown.

[0038] During data transmission, R periodically sends its own ACL information to S. When the primary user appea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security mechanism with combination of a secure channel switching strategy and a curtain-style digital signature scheme, which aims at guaranteeing the security of a single-transceiver time-slot type cognitive radio C-MAC (Cognitive-Multiple Access Control) protocol and preventing possible channel preemptive-type denial of service attack. The method comprises the following steps of: carrying out random sequencing and encrypting by utilizing an available channel list so that malicious nodes can not monitor channel consultation information between communicating parties, thereby avoiding the malicious nodes from seizing channels; and secondly, establishing a signature scheme with a curtain-type relational structure by adopting two hash functions to solve the problem that the correlation of a plurality of signature process needs to be guaranteed when a cognitive ratio network adopts digital signatures. The invention guarantees the suspensive communication caused by withdrawing a master user before the cognitive ratio C-MAC protocol can be accessed into an idle channel to continuously communicate under the situation of suffering from denial of service attack.

Description

technical field [0001] The present invention proposes a security mechanism combining a security channel switching strategy and a curtain digital signature scheme. Denial of service attack, to ensure that the cognitive radio C-MAC protocol can access the idle channel to continue the communication that was suspended due to backing off the main user in the case of a denial of service attack. Background technique [0002] There are serious security problems in the MAC layer of cognitive radio networks. Denial of service attack is one of them. At present, the relevant research at home and abroad only focuses on the demonstration of the danger of the attack, and there is no effective method for how to prevent the attack. The paper "MAC-Layer Misbehaviors in Multi-Hop CognitiveRadio Networks" studies the denial of service attack in cognitive networks in its own cognitive model. They believe that the denial of service attack is that the attacker weakens the common control channel ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/03H04W12/069H04W12/126
Inventor 周贤伟吴华怡王超惠宁郭继文
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products