Unlock instant, AI-driven research and patent intelligence for your innovation.

A broadband cognitive wireless communication method and system

A cognitive wireless communication and broadband technology, applied in the field of wireless communication security encryption, wireless communication, can solve security threats, easy leakage of random numbers and other problems, to ensure node security, improve security and reliability, crack possibility Reduced effect

Active Publication Date: 2021-11-23
CHINA ELECTRIC POWER RES INST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the existing dynamic encryption method, it cannot solve the above-mentioned defects caused by the static key encryption method. The main reason is that many of the existing dynamic encryption methods use the method of generating random numbers and broadcasting the random numbers. , and then the transceiver formulates an encryption method according to the random number, but this method requires a special module for generating random numbers, and the random numbers are easily leaked during the broadcast process, so the security is also threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A broadband cognitive wireless communication method and system
  • A broadband cognitive wireless communication method and system
  • A broadband cognitive wireless communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0158] see Figure 5 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0159] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;

[0160] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the encrypted data to be transmitted is transmitted between the two nodes that have ...

Embodiment 2

[0165] see Image 6 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0166] (1) Based on the authentication request, the two nodes to be connected perform connection access authentication;

[0167] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information encryption key and transmitted between the two nodes that have completed the connection access authentication ; Wherein, the step of obtaining the encryption key of the link information includes: obtaining the time stamp at the first preset moment, the center frequency point and the three parameters of the channel bandwidth, the channel bandwidth is determined according to the data bandwidth of the data information to be transmitted, and the center frequency The point is determined according to...

Embodiment 3

[0173] see Figure 7 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:

[0174] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;

[0175] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a broadband cognitive wireless communication method and system. The method includes the following steps: based on an authentication request, two nodes to be connected respectively obtain the IDs of the other party after being encrypted by the connection authentication key, and based on the obtained IDs Perform connection access authentication; wherein, the step of obtaining the connection authentication key includes: obtaining three parameters of a timestamp, a center frequency point and a preset channel bandwidth at the time when the authentication request is issued, and using a first preset master key encryption algorithm Perform encryption operation on the obtained three parameters to obtain the connection authentication key; obtain the connection access authentication result, when the connection access authentication result is successful, encrypt the data information to be transmitted after the connection access authentication is completed. transmission between the two nodes. The method disclosed by the invention can guarantee one or more of node security, connection security and information transmission security by using dynamic encryption security means.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, relates to the field of wireless communication security encryption, in particular to a broadband cognitive wireless communication method and system. Background technique [0002] With the rapid development of digitalization and intelligence in the power industry, wireless communication equipment with high security is urgently needed; however, the power industry does not have a dedicated continuous spectrum, but it needs to transmit high-bandwidth services such as video and images in real time, which requires a complete confidentiality, security, and reliability. [0003] At present, traditional broadband wireless communication systems based on 3GPP (the 3rd Generation Partnership Project) and IEEE (Institute of Electrical and Electronic Engineers, Institute of Electrical and Electronics Engineers) standards use licensed dedicated spectrum or shared Spectrum, supports fixed channel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/069H04W16/14H04L9/06H04L9/32H04L29/06
CPCH04W12/069H04W16/14H04L9/0625H04L9/0631H04L9/3297H04L63/0457
Inventor 张慧丁慧霞段钧宝曾姝彦王智慧陆民程磊张庚吴赛汪洋孟萨出拉潘娟李艳波
Owner CHINA ELECTRIC POWER RES INST