A broadband cognitive wireless communication method and system
A cognitive wireless communication and broadband technology, applied in the field of wireless communication security encryption, wireless communication, can solve security threats, easy leakage of random numbers and other problems, to ensure node security, improve security and reliability, crack possibility Reduced effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0158] see Figure 5 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:
[0159] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;
[0160] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the encrypted data to be transmitted is transmitted between the two nodes that have ...
Embodiment 2
[0165] see Image 6 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:
[0166] (1) Based on the authentication request, the two nodes to be connected perform connection access authentication;
[0167] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information encryption key and transmitted between the two nodes that have completed the connection access authentication ; Wherein, the step of obtaining the encryption key of the link information includes: obtaining the time stamp at the first preset moment, the center frequency point and the three parameters of the channel bandwidth, the channel bandwidth is determined according to the data bandwidth of the data information to be transmitted, and the center frequency The point is determined according to...
Embodiment 3
[0173] see Figure 7 , a kind of dynamic authentication encryption method of the embodiment of the present invention, comprises the following steps:
[0174] (1) Based on the authentication request, the two nodes to be connected respectively obtain the ID of the other party encrypted by the connection authentication key, and perform connection access authentication based on the obtained ID; wherein, the steps of obtaining the connection authentication key include: Obtaining the three parameters of time stamp, center frequency point and preset channel bandwidth at the moment when the authentication request is issued, and using the first preset master key encryption algorithm to encrypt the acquired three parameters to obtain the connection authentication key;
[0175] (2) Obtain the connection access authentication result. When the connection access authentication result is successfully passed, the data information to be transmitted will be encrypted with the link information e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


