Unlock instant, AI-driven research and patent intelligence for your innovation.

Broadband cognitive wireless communication method and system

A technology for cognitive wireless communication and broadband, applied in the field of wireless communication and wireless communication security encryption, it can solve the problems of security threats, easy leakage of random numbers, etc., to ensure node security, improve security and reliability, and prevent brute force cracking Effect

Active Publication Date: 2021-10-01
CHINA ELECTRIC POWER RES INST
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the existing dynamic encryption method, it cannot solve the above-mentioned defects caused by the static key encryption method. The main reason is that many of the existing dynamic encryption methods use the method of generating random numbers and broadcasting the random numbers. , and then the transceiver formulates an encryption method according to the random number, but this method requires a special module for generating random numbers, and the random numbers are easily leaked during the broadcast process, so the security is also threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Broadband cognitive wireless communication method and system
  • Broadband cognitive wireless communication method and system
  • Broadband cognitive wireless communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0158] see Figure 5 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0159] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;

[0160] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the encrypted data to be transmitted is transmitted between the two nodes that have ...

Embodiment 2

[0165] see Image 6 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0166] (1) Based on the authentication request, the two nodes to be connected perform connection access authentication;

[0167] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information encryption key and transmitted between the two nodes that have completed the connection access authentication ; Wherein, the step of obtaining the encryption key of the link information includes: obtaining the time stamp at the first preset moment, the center frequency point and the three parameters of the channel bandwidth, the channel bandwidth is determined according to the data bandwidth of the data information to be transmitted, and the center frequency The point is determined according to...

Embodiment 3

[0173] see Figure 7 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0174] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;

[0175] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a broadband cognitive wireless communication method and system. The method comprises the following steps: based on an authentication request, two nodes to be connected respectively obtain IDs (Identity) of the opposite side after being encrypted by a connection authentication key, and carry out connection access authentication based on the obtained IDs; wherein the step of collecting the connection authentication key comprises the following steps of: collecting three parameters, namely a timestamp, a central frequency point and a preset channel bandwidth of an authentication request sending moment, and performing encryption operation on the three collected parameters by adopting a first preset main key encryption algorithm to obtain the connection authentication key; and collecting a connection access authentication result, and when the connection access authentication result is successful, transmitting the encrypted to-be-transmitted data information between the two nodes completing the connection access authentication. According to the method disclosed by the invention, one or more of node safety, connection safety and information transmission safety can be guaranteed by a dynamic encryption safety means.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, relates to the field of wireless communication security encryption, in particular to a broadband cognitive wireless communication method and system. Background technique [0002] With the rapid development of digitalization and intelligence in the power industry, wireless communication equipment with high security is urgently needed; however, the power industry does not have a dedicated continuous spectrum, but it needs to transmit high-bandwidth services such as video and images in real time, which requires a complete confidentiality, security, and reliability. [0003] At present, traditional broadband wireless communication systems based on 3GPP (the 3rd Generation Partnership Project) and IEEE (Institute of Electrical and Electronic Engineers, Institute of Electrical and Electronics Engineers) standards use licensed dedicated spectrum or shared Spectrum, supports fixed channel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/069H04W16/14H04L9/06H04L9/32H04L29/06
CPCH04W12/069H04W16/14H04L9/0625H04L9/0631H04L9/3297H04L63/0457
Inventor 张慧丁慧霞段钧宝曾姝彦王智慧陆民程磊张庚吴赛汪洋孟萨出拉潘娟李艳波
Owner CHINA ELECTRIC POWER RES INST