Security Spectrum Management Scheme in Ad Hoc Cognitive Radio Networks
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Point to the security of four sub modules in spectrum management, with the cryptographic protocols that include zero-knowledge proof, group key management, bit commitment proof and security multi computation design a novel scheme to protect the network security, which has the four substantial problems of primary identity, secure channels, information share and shared channels. This scheme not only protects the security of spectrum management, but also improves the efficiency of security management, which is more complete and flexible than the physics scheme.

    Reference
    Related
    Cited by
Get Citation

孙丽艳,周健.一种Ad Hoc 认知无线电安全频谱管理方案.计算机系统应用,2011,20(3):60-63

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:July 13,2010
  • Revised:September 18,2010
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063