CN101860861B - Entity authenticating system and method of cognitive radio network based on hierarchical structure - Google Patents
Entity authenticating system and method of cognitive radio network based on hierarchical structure Download PDFInfo
- Publication number
- CN101860861B CN101860861B CN201010173821.7A CN201010173821A CN101860861B CN 101860861 B CN101860861 B CN 101860861B CN 201010173821 A CN201010173821 A CN 201010173821A CN 101860861 B CN101860861 B CN 101860861B
- Authority
- CN
- China
- Prior art keywords
- user
- sbs
- cognitive radio
- con
- represent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides entity authenticating system and method of a cognitive radio network, which relates to the relevant applying field in information safety technology. The entity authenticating system and the method of the cognitive radio network based on a hierarchical structure ensure the safe communication between secondary users by authenticating the identities of the secondary users in the cognitive radio network. In the process of sending the authentication request by the secondary user, the credibility is judged, and the public key verification is allowed to further execute only in the premise that the condition is satisfied. The trusting mechanism can effectively prevent the malignant users from generating multiple attacks in the network. The safety is based on n RSA algorithm, and simultaneously the symmetrical keys and the public key system are combined. In the premise of ensuring that the authenticating safety is not decreased, the authenticating efficiency is greatly enhanced, thereby effectively decreasing the authenticating delay. In addition, the invention has obvious effects on the safety problems of preventing the reproducing attack, controlling network congestion and the like.
Description
Technical field
The present invention relates to cognitive radio networks safety-relevant applications field in information security technology, relate in particular to a kind of entity authenticating system and method thereof of the cognitive radio networks based on hierarchy.
Background technology
Cognitive radio users, in communication process, constantly access and exit cognitive radio networks, and therefore topology of networks is dynamic change.In cognitive radio networks, inferior user and primary user's service quality should be basically identical, but but the difference of their Service Privileges priority.Make like this cognitive radio networks more complicated, be more difficult to effectively control the operation of whole network, leave more chance to opponent.The following safety problem of network faces:
(1) network topology and member's dynamic change: due to the access randomly of node, exit network, the topology of cognitive radio networks is among a kind of dynamic change always, and this requires to solve the dynamic topology problem of network.
(2) fragile wireless link: passive and active attack is the potential safety hazard of wireless link, especially seems particularly important as problems such as denial of service (DoS), forgery, personation, invasion attack, selfish attacks.
(3) frequency spectrum is accessed and is exited continually: cognitive user accesses, exits frequency spectrum continually, makes initiatively opponent more easily forge its identity access frequency spectrum, and then attacking network.
When user is when preparing access cognitive radio networks, the user in order to allow with legal identity adds network also can effectively stop disabled user's access, thereby guarantee the fail safe of cognitive radio networks, cognitive radio networks must adopt entity authentication mechanism to determine the legitimacy of user identity so.
Cognitive radio networks is mainly to solve not reduce by the service quality that limited frequency spectrum resource meets ever-increasing user group and user.User accesses frequently and exits cognitive radio networks and make network more open, and the fail safe of network is more fragile, and the authentication of therefore carrying out it to preparing the user of access cognitive radio networks is necessary.And now traditional entity authentication scheme comprises based on public key encryption certificate scheme and symmetric key encryption scheme and is all not suitable for frequent this feature switched of frequency spectrum.The mainly certificate scheme based on expansion of the authentication mechanism of cognitive radio networks at present.
Specifically can the entity authentication scheme (M.Kuroda of list of references [1-2] based on wheel type structure based on extendible entity authentication mechanism, R.Nomura and W.Trppe, " A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios, " in Proceedings 4th Annual IEEE Society Conference onSensor, Mesh and Ad Hoc Communications and Networks, pp.70-79, June 2007. and R.Nomura, M.Kuroda, T.Mizuno, " Evaluation of EAP based re-authentication protocol forhigh-speed vehicular handover in cognitive radio networks, " in Proceedings 2nd InternationalConference on Cognitive Radio Oriented Wireless Networks and Communications, pp.549-553, 2007.), certificate scheme (the B.B.Sathish and P.Venkataram of document [3-4] based on cognitive agent, " Transactionbased authentication scheme for mobile communication:a cognitive agent based approach, " inProceedings 7th IEEE International Conference on Parallel and Distributed ProcessingSymposium, pp.1-8, March 2007. and B.B.Sathish and P.Venkataram, " An authenticationscheme for personalized mobile multimedia services:A cognitive agents based approach, " Future Generation Communication and Networking, vol.1, pp.167-172, December 2007.) etc. open source literature.
Owing to not having the problem that in considering cognition radio net, frequency spectrum switches frequently, the authentication time delay of such entity authentication scheme will produce a very large impact the efficiency of this scheme.For such problem, we have proposed the novel certificate scheme (HSAS-CRN) of cognitive radio networks.
Summary of the invention
Main purpose of the present invention is to provide the entity authenticating system in a kind of cognitive radio networks, so that the user identity in cognitive radio networks is authenticated, and the safety of communicating by letter between assurance user, thus effectively prevent impersonation attack.
Technical scheme of the present invention is: the entity authenticating system of the cognitive radio networks based on hierarchy, and this system mainly comprises following four functional modules, is respectively registration authorization module, trust analysis module, behaviour decision making module and certificate granting module;
Described registration authorization module is the certificate that can verify time user identity for storing.Before any user wants to access cognitive radio networks, described user's identity information is first registered at a certain subbase station; Then local network management center produces a unsymmetrical key; Last PKI is stored in this subbase station, and corresponding Private key distribution is given this user;
Described trust analysis module is for distinguishing whether time user is legal; By analyzing time user's information, calculate this user's trust value.If being greater than certain threshold value, this trust value assert that so this user is for legal;
Described behaviour decision making module is used for determining whether time user can access cognitive radio networks; The subbase station that obtains trust value and this value is returned to this user of registration by carrying out this module;
Described certificate granting module is for distributes digital certificates; By carrying out this module, whether dominant base allows this user by authentication at notice access subbase station.
The method of the entity authenticating system of the cognitive radio networks based on hierarchy, the method comprises the following steps:
Suppose to have in cognitive radio networks n time user.Local network management center produces n to unsymmetrical key, PU
iand PR
irepresent respectively time user SU
ipKI and private key, PU
ithe subbase station SBS distributing to
iand PR
idistributed to inferior user SU
i.Represent access point with AP; Identity code ID
irepresent SU
iunique identity characteristic, data transfer rate drc
irepresent SU
itransmit under normal circumstances the speed of data and be a constant.Trust value bv
ibe used for measuring SU
itrusting degree; Request represents that request bag and Ack represent to reply bag; E
k(m
1|| ... || m
n) carry out encrypting messages m by key K
1... m
n, between message, use cascade || connect; ≈ is two metasymbols, and equation A ≈ B represents A=B+ δ, wherein 0≤δ < 10.
(1) authorize registration: work as SU
ibefore access network, need described SU
icorrelation properties register, and during access network afterwards, by with the described SU of storage
icharacter Comparison decide SU
iin whether can access network.Described SU
ifirst send authentication request bag ID
i, drc
i, Request, Time
igive nearest SBS
i; Described SBS subsequently
ialso give described SU
ireturn to an authentication and reply bag ID
i, Ack, Time
i; Last described SBS
ithe PU producing
istorage, corresponding PR
ibe assigned to described SU
i, put bv
i=0;
(2) authentication request: described SU
ito nearest AP, send data request packet; AP is to described SU subsequently
iwith described SBS
isend return data bag; Described SBS
iby unique route return messages, give described SU
i; As described SU
iafter receiving this message, and to dominant base generation message;
(3) communication: this module is mainly for selecting effectively inferior user profile and being transferred to dominant base.To each j (1≤j ≠ i≤n) calculate
if bv
i>=-C and
so described SBS
isend parametric t im
jwith
give dominant base, and send parameter PU
i, ID
i, Δ con
i, tim
i, thr
i, bv
igive dominant base; If otherwise bv
ithe so described SU of <-C
iany message of the fly-by-night transmission of refusal simultaneously;
(4) trust analysis: described dominant base is received SBS described in above-mentioned steps
iinformation.First obtain trust information
if Δ con
i< 0 puts bv so
i=bv
i+ 1 otherwise put bv
i=bv
i-1; If DRC
i≈ thr
i/ tim
iput so bv
i=bv
i+ 1, otherwise put bv
i=bv
i-1; If bv
i> C is assignment bv else if so again
i<-C is assignment bv so again
i=-(C+1); Described dominant base transmission trust value bv
igive registration SU
isubbase station;
(5) behaviour decision making: the trust value obtaining according to above-mentioned steps (4) judges whether to allow described SU
iaccess cognitive radio networks; If the result of trust analysis is mistrustful, dominant base sends mistrustful message to the described SU of registration so
isBS
i, and send refuse information to described SU
i; Otherwise described dominant base sends success message to the described SU of access
isBS
i, and send permission message to described SU
i;
(6) information is mainly collected time user's congestion ratio and data transmission rate by registration subbase station.As registration subbase station SBS
ireceive this transmission data complete packet time, num
i=num
i+ 1, tim
i=tim
i+ t
i, thr
i=thr
i+ c
i, wherein t
itransmission time and c
iit is throughput; If congested generation, so
con
i=con
i+ 1, otherwise assignment Δ con
i=-1; Last described SBS
istored parameter num
i, con
i, Δ con
i, tim
i, thr
i.
The invention has the beneficial effects as follows: owing to adopting technique scheme, the present invention be directed to the feature of carrying out continually frequency spectrum switching in cognitive radio networks, and to constantly carry out transfer of data between inferior user, primary user and cognitive radio networks, authentication will become one of important means preventing impersonation attack so, a kind of entity authentication scheme (Hierarchical-based Structure Entity Authentication Scheme, HSAS-CRN) of cognitive radio networks is proposed.The fail safe of this scheme is the difficulty according to large number factorization, and the faith mechanism of having introduced the thought of layer architecture and increasing simultaneously can prevent that Denial of Service attack and congested while from significantly having reduced authentication time delay effectively.
Accompanying drawing explanation
Fig. 1 is entity authenticating system and the authentication system figure of method based on layer architecture thereof that the present invention is based on the cognitive radio networks of hierarchy.
Fig. 2 is a verification process figure of the inventive method HSAS-CRN.
Fig. 3 is the flow chart of this method HSAS-CRN of the present invention.
Embodiment
Below in conjunction with example, the invention will be further described.
If Fig. 1 is entity authenticating system and the authentication system figure of method validation system based on layer architecture thereof that the present invention is based on the cognitive radio networks of hierarchy, computer and mobile phone representative time user, except dominant base each subbase station directly a connected database be used for storing digital certificate.This digital certificate comprises PKI, user identity identification code and enciphered message.The main task of dominant base is connect all subbase stations and access major network, for example: internet or other cognitive radio networks.Between each subbase station and dominant base, have unique wireless link to carry out interaction data while dominant base and access again in other cognitive radio networks, therefore our certificate scheme of structure is the system of the opening of a layering.
As shown in Figure 2, a verification process of this method HSAS-CRN, detailed process is as follows:
(1) inferior user → registration subbase station: (ID
i, drc
i, Request, Time
i);
(2) registration subbase station → inferior user: (ID
i, Ack, Time
i);
(4) inferior user → access point: (ID
i, Request, Time
i);
(5) access point → inferior user: (ID
i, Ack, Time
i), access point → registration subbase station: (ID
i, Ack, Time
i);
(6) registration subbase station → access point: (Message, Time
i)
mAC;
(7) access point → inferior user: (Message, Time
i)
mAC
(9) dominant base → registration subbase station: (ID
i, Information, Time
i);
(10) registration subbase station → dominant base:
(12) dominant base → registration subbase station → inferior user: (ID
i, Reject, Time
i)
mAC;
(12*) dominant base → access subbase station → inferior user: (ID
i, Permit, Time
i)
mAC;
(13) inferior user → registration subbase station: (ID
i, Request, Gather, Time
i);
(14) registration subbase station → inferior user: (ID
i, Respond, Gather, Time
i)
Be illustrated in figure 3 the flow chart of this method HSAS-CRN.
Suppose that certain user prepares to access a certain cognitive radio networks, the unique identify label of this user is respectively so: ID
4.Before carrying out authentication, inferior user first will obtain near subbase station its identity information of registration its private key later, and PKI is kept in the subbase station of register information.Be located at the user who registers in this subbase station outdoor except this above-mentioned use, also have three cognitive radio users.Trust value, access number of times, times of congestion, transmission time and throughput during their a certain states can be expressed as:
Introduce time user ID below
4concrete verification process:
Suppose that this user is never linked into cognitive radio networks, they are new users.First to user ID
4access the verification process of cognitive radio networks.
(1) inferior user ID
4carry out and authorize registration algorithm, and obtain private key and establish trust value bv
4=0.
(2), when this user need to access cognitive radio networks, carry out authentication request algorithm.
(3) because this user never accesses cognitive radio networks, num
4=0, con
4=-1, Δ con
4=0, tim
4=0s and thr
4=0kb, and the intrinsic data transmission rate of this user is drc
4=45kb/s.
(4) carry out communication algorithm.All the users to this base station calculate:
according to the restriction to trust value and data transmission rate in communication algorithm, by inferior user ID
1and ID
2tim turn-on time
jand throughput
and inferior user ID
4relevant parameter from registration subbase station send to dominant base.
(5) when dominant base receives the information of sending at registration subbase station, dominant base is carried out trust analysis algorithm.First calculate
due to tim
4=0 and Δ con
4=-1, thus the trust value bv obtaining
4=1.Finally the trust value newly obtaining is transferred to registration time user ID
4subbase station, and return to trust value.
(6) act of execution decision making algorithm, by authenticity and the validity of verification public key certificate.If this certificate is true, effective, time user ID so
4to be allowed to access cognitive radio networks communicates.Carry out subsequently certificate granting algorithm, guarantee that time user can be in this cognitive radio networks share spectrum resources.
(7) when inferior user ID
4when transfer of data completes or primary user occurs, this information communication of this user finishes.Carry out information algorithm, by access point, register subbase station and will obtain its relevant parameter: num
4=1, tim
4=4s, thr
4=200kb, Δ con
4=-1, con
4=0.
Implementation by above-mentioned identifying procedure is at present in this registration subbase station, and inferior user's information is updated to:
User's name ID | ID 1 | ID 2 | ID 3 | ID 4 |
Trust value bv | 1 | 0 | -1 | 1 |
Access frequency n um | 10 | 8 | 6 | 1 |
Times of congestion con | 1 | 2 | 3 | 0 |
Turn-on time tim | 100s | 90s | 30s | 4s |
Throughput thr | 5000kb | 3000kb | 1000kb | 200kb |
Data transmission rate drc | 50kb/s | 30kb/s | 40kb/s | 45kb/s |
Congestion change rate Δ con | -0.5 | -0.2 | -0.4 | -1 |
Although certain time time user ID
3want to access this cognitive radio networks, but its trust value is lower than the trust value requirement of access cognitive radio networks, therefore such user just again cannot access cognition wireless network.Now time user ID
1want to access cognitive radio networks, equally again carry out identifying procedure.
(1) first initiate authentication request, and carry out authentication request algorithm.
(2) carry out communication algorithm.All the users to this subbase station calculate:
according to the requirement to trust value and data transmission rate in communication algorithm, by inferior user ID
2, ID
3and ID
4tim turn-on time
jand throughput
and inferior user ID
1relevant parameter from registration subbase station send to dominant base.
(5) when dominant base receives the information of being sent by registration subbase station, dominant base is carried out trust analysis algorithm.First calculate
and DRC
1≈ thr
1/ tim
1, therefore trust value bv
1=2.Again due to Δ con
1=-2.5 < 0, trust value is now bv
1=3.But due to bv
1> 1, thereby the trust value bv obtaining
4=1.Finally the trust value newly obtaining is transferred to registration time user ID
4subbase station, and return to trust value.
(6) act of execution decision making algorithm, by authenticity and the validity of verification public key certificate.If this certificate is true, effective, time user ID so
1to be allowed to access cognitive radio networks communicates.Carry out subsequently certificate granting algorithm, guarantee that time user can be in cognitive radio networks share spectrum resources.
(7) due to inferior user ID
1transfer of data completes or primary user occurs, this DTD of inferior user.Carry out information algorithm, by access point, register subbase station and will obtain its relevant parameter: num
4=11, tim
4=110s, thr
4=5200kb,
con
4=2.If l=6, so Δ con
4=0.03.
Implementation by above-mentioned identifying procedure is at present in this registration subbase station, and inferior user's information is updated to:
User's name ID | ID 1 | ID 2 | ID 3 | ID 4 |
Trust value bv | 1 | 0 | -1 | 1 |
Access frequency n um | 11 | 8 | 6 | 1 |
Times of congestion con | 2 | 2 | 3 | 0 |
Turn-on time tim | 110s | 90s | 30s | 10s |
Throughput thr | 5200kb | 3000kb | 1000kb | 500kb |
Data transmission rate arc | 50kb/s | 30kb/s | 40kb/s | 45kb/s |
Congestion change rate Δ con | 0.03 | -0.2 | -0.4 | -1 |
Claims (1)
1. an entity authentication method for the cognitive radio networks based on hierarchy, is characterized in that, the method comprises the following steps:
Suppose to have in cognitive radio networks n time user; Local network management center produces n to unsymmetrical key, PU
iand PR
irepresent respectively time user SU
ipKI and private key, PU
idistribute to subbase station SBS
i, PR
idistributed to inferior user SU
i; Represent access point with AP; Identity code ID
irepresent SU
iunique identity characteristic, trust value bv
ibe used for measuring SU
itrusting degree; Request represents that request bag and Ack represent to reply bag; E
k(m
1|| ... || m
n) carry out encrypting messages m by key K
1... m
n, wherein, between message, use cascade || connect; Time
irepresent that message sends the timestamp in bag; ≈ is two metasymbols, and equation A ≈ B represents A=B+ δ, wherein 0≤δ < 10;
If data transfer rate drc
irepresent time user SU
itransmit under normal circumstances the speed of data and be a constant; num
irepresent time user SU
ithe number of times of access network; tim
irepresent time user SU
iobtain the service total time of Internet resources; thr
ibe illustrated in time user SU
ithis user's of process service data total amount when obtaining service; con
irepresent the times of congestion that network occurs due to this user of access; Δ con
irepresent time user SU
ithe congestion change rate producing;
(1) authorize registration: work as SU
ibefore access network, need described SU
icorrelation properties register, and afterwards during access network, by with the described SU of storage
icharacter Comparison decide SU
iin whether can access network; Described SU
ifirst send authentication request bag Request to nearest SBS
i; Described SBS subsequently
ialso give described SU
ireturn to an authentication and reply bag Ack; Last described SBS
ithe PU producing
iand PR
istorage, and PR
idistribute to described SU
i, put bv
i=0;
(2) authentication request: described SU
ito nearest AP, send data request packet; AP is to described SU subsequently
iwith described SBS
isend return data bag; Described SBS
iby unique route return messages, give described SU
i; As described SU
iafter receiving this message, and send message to dominant base;
(3) communication: communication is mainly to select effectively time user profile to be transferred to dominant base; To each j (1≤j ≠ i≤n) calculate
if bv
i>=-C and
so described SBS
isend parametric t im
jwith
give dominant base, and send parameter PU
i, ID
i, Δ con
i, tim
i, thr
i, bv
igive dominant base; If otherwise bv
ithe so described SU of <-C
ifly-by-night, any message of refusal transmission simultaneously, wherein, C represents certain threshold value;
(4) trust analysis: described dominant base is received SBS described in above-mentioned steps
iinformation; First obtain trust information
if Δ con
i< 0 puts bv so
i=bv
i+ 1 otherwise put bv
i=bv
i-1; If DRC
i≈ thr
i/ tim
iput so bv
i=bv
i+ 1; Otherwise put bv
i=bv
i-1; If bv
i> C, assignment so again, else if bv
i<-C, so again assignment bv
i=-(C+1), wherein, C represents certain threshold value; Described dominant base transmission trust value bv
igive registration SU
isubbase station;
(5) behaviour decision making: the trust value obtaining according to above-mentioned steps (4) judges whether to allow described SU
iaccess cognitive radio networks; If the result of trust analysis is mistrustful, dominant base sends mistrustful message to the described SU of registration so
isBS
i, and send refuse information to described SU
i; Otherwise described dominant base sends success message to the described SU of access
isBS
i, and send permission message to described SU
i;
(6) information: congestion ratio and the data transmission rate of mainly being collected time user by registration subbase station; As registration subbase station SBS
ireceive this transmission data complete packet time, num
i=num
i+ 1, tim
i=tim
i+ t
i, thr
i=thr
i+ c
i, wherein t
itransmission time and c
iit is throughput; If do not occur congested, assignment Δ con
i=-1; Last described SBS
istored parameter num
i, con
i, Δ con
i, tim
i, thr
i.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010173821.7A CN101860861B (en) | 2010-05-10 | 2010-05-10 | Entity authenticating system and method of cognitive radio network based on hierarchical structure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010173821.7A CN101860861B (en) | 2010-05-10 | 2010-05-10 | Entity authenticating system and method of cognitive radio network based on hierarchical structure |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101860861A CN101860861A (en) | 2010-10-13 |
CN101860861B true CN101860861B (en) | 2014-05-07 |
Family
ID=42946450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010173821.7A Expired - Fee Related CN101860861B (en) | 2010-05-10 | 2010-05-10 | Entity authenticating system and method of cognitive radio network based on hierarchical structure |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101860861B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101980557B (en) * | 2010-11-29 | 2013-05-08 | 武汉大学 | Method for generating random number in cognitive radio network and communication key generation method |
CN102096405B (en) * | 2011-01-05 | 2013-05-01 | 深圳市赛远自动化系统有限公司 | Remote industrial network monitoring method and system based on S-Link and VLAN (Virtual Local Area Network) technique |
US9313659B2 (en) * | 2011-01-20 | 2016-04-12 | Koninklijke Philips N.V. | Authentication and authorization of cognitive radio devices |
CN102833816A (en) * | 2011-06-17 | 2012-12-19 | 中兴通讯股份有限公司 | Access method and system for cognitive radio user |
CN107800471B (en) * | 2017-11-17 | 2019-12-24 | 西安电子科技大学 | Satellite random access congestion control method based on multi-packet reception |
CN111343637A (en) * | 2020-03-03 | 2020-06-26 | 福建师范大学 | Method for realizing secondary user position verification in cognitive wireless network |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1539216A (en) * | 2001-08-03 | 2004-10-20 | 诺基亚有限公司 | System and method for managing network service auess and enrollment |
EP1750466A1 (en) * | 2005-08-04 | 2007-02-07 | STMicroelectronics S.r.l. | Method and system for dynamic spectrum allocation, and computer program product therefor |
CN101568108A (en) * | 2008-04-21 | 2009-10-28 | 华为技术有限公司 | Switching method and equipment between heteroid systems |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494862A (en) * | 2008-12-05 | 2009-07-29 | 北京工业大学 | Access authentication method of wireless mesh network |
-
2010
- 2010-05-10 CN CN201010173821.7A patent/CN101860861B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1539216A (en) * | 2001-08-03 | 2004-10-20 | 诺基亚有限公司 | System and method for managing network service auess and enrollment |
EP1750466A1 (en) * | 2005-08-04 | 2007-02-07 | STMicroelectronics S.r.l. | Method and system for dynamic spectrum allocation, and computer program product therefor |
CN101568108A (en) * | 2008-04-21 | 2009-10-28 | 华为技术有限公司 | Switching method and equipment between heteroid systems |
Also Published As
Publication number | Publication date |
---|---|
CN101860861A (en) | 2010-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lai et al. | Security and privacy challenges in 5G-enabled vehicular networks | |
Huang et al. | Recent advances and challenges in security and privacy for V2X communications | |
Lei et al. | A blockchain based certificate revocation scheme for vehicular communication systems | |
Chen et al. | Stochastic blockchain for IoT data integrity | |
Wasef et al. | Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks] | |
CN101262333B (en) | A secure communication method between nodes in vehicular network | |
CN101222331B (en) | Authentication server, method and system for bidirectional authentication in mesh network | |
CN101056177B (en) | Radio mesh re-authentication method based on the WLAN secure standard WAPI | |
Raya et al. | Revocation games in ephemeral networks | |
CN101860861B (en) | Entity authenticating system and method of cognitive radio network based on hierarchical structure | |
Quyoom et al. | Security attacks and challenges of VANETs: a literature survey | |
Chaurasia et al. | Infrastructure based authentication in VANETs | |
CN112752236B (en) | Block chain-based networking automobile authentication method, equipment and storage medium | |
George et al. | Secure identity management framework for vehicular ad-hoc network using blockchain | |
Parvin et al. | Trust-based authentication for secure communication in cognitive radio networks | |
Vasudev et al. | A lightweight authentication protocol for V2V communication in VANETs | |
Tangade et al. | Trust management scheme in VANET: Neighbour communication based approach | |
Asghar et al. | An efficient voting based decentralized revocation protocol for vehicular ad hoc networks | |
Boubakri et al. | Access control in 5G communication networks using simple PKI certificates | |
Bissmeyer et al. | Security in hybrid vehicular communication based on ITS-G5, LTE-V, and mobile edge computing | |
Hamdan et al. | Review of authentication with privacy-preserving schemes for 5G-enabled vehicular networks | |
Xi et al. | Probabilistic adaptive anonymous authentication in vehicular networks | |
Verma | An efficient secure vanet communication using multi authenticate homomorphic signature algorithm | |
Priya et al. | Secure privacy and distributed group authentication for VANET | |
Pandey et al. | Security challenges and solutions for next-generation VANETs: an exploratory study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140507 Termination date: 20160510 |
|
CF01 | Termination of patent right due to non-payment of annual fee |