Communication key generation method and secure channel selection method for cognitive radio system

A cognitive radio and communication key technology, applied in the field of secure channel selection, can solve the problems of low randomness and inappropriateness, and achieve the effects of realizing secure channel selection and data secure communication, preventing eavesdropping, and high generation rate

Active Publication Date: 2012-12-19
贾晓丽
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the reciprocity and difference of the physical transmission characteristics of the wireless channel, it can be used to obtain the incentive source for the generation of the communication key. There is no need to perform communication key interaction, which can eliminate security risks such as communication key theft, fixed-frequency interference, and saturation attacks. However, the communication key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication key generation method and secure channel selection method for cognitive radio system
  • Communication key generation method and secure channel selection method for cognitive radio system
  • Communication key generation method and secure channel selection method for cognitive radio system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0025] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0026] For attached figure 1 In the shown cognitive radio system communication key generation model, the communication key generation steps are as follows:

[0027] Step 1. According to the node A with nodeB The local spectrum pool selection constructs the public available channel set C ={ f 2 , f 3}, the number of channels in the set N =2, select a channel from the public available channel set f 2 ,node A Use this channel to send th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication key generation method and a secure channel selection method for a cognitive radio system, and belongs to the field of secure communication and information security in radio communication. A common available channel set is established according to a local spectrum pool of received and transmitted nodes, the quantity of channels of the channel set is at least equal to one, beacon signals with random initial phases are received and transmitted multiple times by the aid of channels which are sequentially selected from the available channel set, and phases of the received signals are detected and utilized for generating a random key element matrix according to reciprocity of wireless transmission characteristics of the same channels within a coherent time and differentiation of wireless transmission characteristics of different channels, and finally communication keys are acquired by fusion processing of the matrix. The communication keys are used for encrypting transmitted information and are also used as random seeds for selecting secure communication channels. The communication key generation method and the secure channel selection method have the advantages that interaction of the communication keys among the received and transmitted nodes through the channels is omitted, hidden dangers such as wiretapping, tampering and saturation attack from attackers can be eliminated, and commutation security of the cognitive radio system can be guaranteed.

Description

technical field [0001] The present invention relates to the fields of secure communication and information security in the field of wireless communication, specifically, a method for generating a communication key and a method for selecting a secure channel based on channel physical characteristics when a cognitive radio system performs secure communication. Background technique [0002] Cognitive radio can alleviate the contradiction between spectrum demand and resource constraints, and has a good application prospect. In addition to traditional wireless communication security threats such as control channel saturation attacks, channel eavesdropping, and fixed-frequency interference, cognitive radio systems also have their own unique security risks, such as imitating primary user attacks, attacking spectrum managers, channel negotiation blocking, etc. . [0003] A common method to solve communication security is to design a security strategy for a wireless communication sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/04H04W12/03H04W12/041H04W12/122
Inventor 冯文江张丽蒋卫恒李林廖万丽韩培培
Owner 贾晓丽
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products