CN101860861B - Entity authenticating system and method of cognitive radio network based on hierarchical structure - Google Patents

Entity authenticating system and method of cognitive radio network based on hierarchical structure Download PDF

Info

Publication number
CN101860861B
CN101860861B CN201010173821.7A CN201010173821A CN101860861B CN 101860861 B CN101860861 B CN 101860861B CN 201010173821 A CN201010173821 A CN 201010173821A CN 101860861 B CN101860861 B CN 101860861B
Authority
CN
China
Prior art keywords
user
sbs
cognitive radio
con
represent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010173821.7A
Other languages
Chinese (zh)
Other versions
CN101860861A (en
Inventor
周贤伟
王超
吴华怡
郭继文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN201010173821.7A priority Critical patent/CN101860861B/en
Publication of CN101860861A publication Critical patent/CN101860861A/en
Application granted granted Critical
Publication of CN101860861B publication Critical patent/CN101860861B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides entity authenticating system and method of a cognitive radio network, which relates to the relevant applying field in information safety technology. The entity authenticating system and the method of the cognitive radio network based on a hierarchical structure ensure the safe communication between secondary users by authenticating the identities of the secondary users in the cognitive radio network. In the process of sending the authentication request by the secondary user, the credibility is judged, and the public key verification is allowed to further execute only in the premise that the condition is satisfied. The trusting mechanism can effectively prevent the malignant users from generating multiple attacks in the network. The safety is based on n RSA algorithm, and simultaneously the symmetrical keys and the public key system are combined. In the premise of ensuring that the authenticating safety is not decreased, the authenticating efficiency is greatly enhanced, thereby effectively decreasing the authenticating delay. In addition, the invention has obvious effects on the safety problems of preventing the reproducing attack, controlling network congestion and the like.

Description

The entity authenticating system of the cognitive radio networks based on hierarchy and method thereof
Technical field
The present invention relates to cognitive radio networks safety-relevant applications field in information security technology, relate in particular to a kind of entity authenticating system and method thereof of the cognitive radio networks based on hierarchy.
Background technology
Cognitive radio users, in communication process, constantly access and exit cognitive radio networks, and therefore topology of networks is dynamic change.In cognitive radio networks, inferior user and primary user's service quality should be basically identical, but but the difference of their Service Privileges priority.Make like this cognitive radio networks more complicated, be more difficult to effectively control the operation of whole network, leave more chance to opponent.The following safety problem of network faces:
(1) network topology and member's dynamic change: due to the access randomly of node, exit network, the topology of cognitive radio networks is among a kind of dynamic change always, and this requires to solve the dynamic topology problem of network.
(2) fragile wireless link: passive and active attack is the potential safety hazard of wireless link, especially seems particularly important as problems such as denial of service (DoS), forgery, personation, invasion attack, selfish attacks.
(3) frequency spectrum is accessed and is exited continually: cognitive user accesses, exits frequency spectrum continually, makes initiatively opponent more easily forge its identity access frequency spectrum, and then attacking network.
When user is when preparing access cognitive radio networks, the user in order to allow with legal identity adds network also can effectively stop disabled user's access, thereby guarantee the fail safe of cognitive radio networks, cognitive radio networks must adopt entity authentication mechanism to determine the legitimacy of user identity so.
Cognitive radio networks is mainly to solve not reduce by the service quality that limited frequency spectrum resource meets ever-increasing user group and user.User accesses frequently and exits cognitive radio networks and make network more open, and the fail safe of network is more fragile, and the authentication of therefore carrying out it to preparing the user of access cognitive radio networks is necessary.And now traditional entity authentication scheme comprises based on public key encryption certificate scheme and symmetric key encryption scheme and is all not suitable for frequent this feature switched of frequency spectrum.The mainly certificate scheme based on expansion of the authentication mechanism of cognitive radio networks at present.
Specifically can the entity authentication scheme (M.Kuroda of list of references [1-2] based on wheel type structure based on extendible entity authentication mechanism, R.Nomura and W.Trppe, " A radio-independent authentication protocol (EAP-CRP) for networks of cognitive radios, " in Proceedings 4th Annual IEEE Society Conference onSensor, Mesh and Ad Hoc Communications and Networks, pp.70-79, June 2007. and R.Nomura, M.Kuroda, T.Mizuno, " Evaluation of EAP based re-authentication protocol forhigh-speed vehicular handover in cognitive radio networks, " in Proceedings 2nd InternationalConference on Cognitive Radio Oriented Wireless Networks and Communications, pp.549-553, 2007.), certificate scheme (the B.B.Sathish and P.Venkataram of document [3-4] based on cognitive agent, " Transactionbased authentication scheme for mobile communication:a cognitive agent based approach, " inProceedings 7th IEEE International Conference on Parallel and Distributed ProcessingSymposium, pp.1-8, March 2007. and B.B.Sathish and P.Venkataram, " An authenticationscheme for personalized mobile multimedia services:A cognitive agents based approach, " Future Generation Communication and Networking, vol.1, pp.167-172, December 2007.) etc. open source literature.
Owing to not having the problem that in considering cognition radio net, frequency spectrum switches frequently, the authentication time delay of such entity authentication scheme will produce a very large impact the efficiency of this scheme.For such problem, we have proposed the novel certificate scheme (HSAS-CRN) of cognitive radio networks.
Summary of the invention
Main purpose of the present invention is to provide the entity authenticating system in a kind of cognitive radio networks, so that the user identity in cognitive radio networks is authenticated, and the safety of communicating by letter between assurance user, thus effectively prevent impersonation attack.
Technical scheme of the present invention is: the entity authenticating system of the cognitive radio networks based on hierarchy, and this system mainly comprises following four functional modules, is respectively registration authorization module, trust analysis module, behaviour decision making module and certificate granting module;
Described registration authorization module is the certificate that can verify time user identity for storing.Before any user wants to access cognitive radio networks, described user's identity information is first registered at a certain subbase station; Then local network management center produces a unsymmetrical key; Last PKI is stored in this subbase station, and corresponding Private key distribution is given this user;
Described trust analysis module is for distinguishing whether time user is legal; By analyzing time user's information, calculate this user's trust value.If being greater than certain threshold value, this trust value assert that so this user is for legal;
Described behaviour decision making module is used for determining whether time user can access cognitive radio networks; The subbase station that obtains trust value and this value is returned to this user of registration by carrying out this module;
Described certificate granting module is for distributes digital certificates; By carrying out this module, whether dominant base allows this user by authentication at notice access subbase station.
The method of the entity authenticating system of the cognitive radio networks based on hierarchy, the method comprises the following steps:
Suppose to have in cognitive radio networks n time user.Local network management center produces n to unsymmetrical key, PU iand PR irepresent respectively time user SU ipKI and private key, PU ithe subbase station SBS distributing to iand PR idistributed to inferior user SU i.Represent access point with AP; Identity code ID irepresent SU iunique identity characteristic, data transfer rate drc irepresent SU itransmit under normal circumstances the speed of data and be a constant.Trust value bv ibe used for measuring SU itrusting degree; Request represents that request bag and Ack represent to reply bag; E k(m 1|| ... || m n) carry out encrypting messages m by key K 1... m n, between message, use cascade || connect; ≈ is two metasymbols, and equation A ≈ B represents A=B+ δ, wherein 0≤δ < 10.
(1) authorize registration: work as SU ibefore access network, need described SU icorrelation properties register, and during access network afterwards, by with the described SU of storage icharacter Comparison decide SU iin whether can access network.Described SU ifirst send authentication request bag ID i, drc i, Request, Time igive nearest SBS i; Described SBS subsequently ialso give described SU ireturn to an authentication and reply bag ID i, Ack, Time i; Last described SBS ithe PU producing istorage, corresponding PR ibe assigned to described SU i, put bv i=0;
(2) authentication request: described SU ito nearest AP, send data request packet; AP is to described SU subsequently iwith described SBS isend return data bag; Described SBS iby unique route return messages, give described SU i; As described SU iafter receiving this message, and to dominant base generation message;
(3) communication: this module is mainly for selecting effectively inferior user profile and being transferred to dominant base.To each j (1≤j ≠ i≤n) calculate
Figure GSA00000123055500031
if bv i>=-C and
Figure GSA00000123055500032
so described SBS isend parametric t im jwith
Figure GSA00000123055500033
give dominant base, and send parameter PU i, ID i, Δ con i, tim i, thr i, bv igive dominant base; If otherwise bv ithe so described SU of <-C iany message of the fly-by-night transmission of refusal simultaneously;
(4) trust analysis: described dominant base is received SBS described in above-mentioned steps iinformation.First obtain trust information
Figure GSA00000123055500034
if Δ con i< 0 puts bv so i=bv i+ 1 otherwise put bv i=bv i-1; If DRC i≈ thr i/ tim iput so bv i=bv i+ 1, otherwise put bv i=bv i-1; If bv i> C is assignment bv else if so again i<-C is assignment bv so again i=-(C+1); Described dominant base transmission trust value bv igive registration SU isubbase station;
(5) behaviour decision making: the trust value obtaining according to above-mentioned steps (4) judges whether to allow described SU iaccess cognitive radio networks; If the result of trust analysis is mistrustful, dominant base sends mistrustful message to the described SU of registration so isBS i, and send refuse information to described SU i; Otherwise described dominant base sends success message to the described SU of access isBS i, and send permission message to described SU i;
(6) information is mainly collected time user's congestion ratio and data transmission rate by registration subbase station.As registration subbase station SBS ireceive this transmission data complete packet time, num i=num i+ 1, tim i=tim i+ t i, thr i=thr i+ c i, wherein t itransmission time and c iit is throughput; If congested generation, so
Figure GSA00000123055500041
con i=con i+ 1, otherwise assignment Δ con i=-1; Last described SBS istored parameter num i, con i, Δ con i, tim i, thr i.
The invention has the beneficial effects as follows: owing to adopting technique scheme, the present invention be directed to the feature of carrying out continually frequency spectrum switching in cognitive radio networks, and to constantly carry out transfer of data between inferior user, primary user and cognitive radio networks, authentication will become one of important means preventing impersonation attack so, a kind of entity authentication scheme (Hierarchical-based Structure Entity Authentication Scheme, HSAS-CRN) of cognitive radio networks is proposed.The fail safe of this scheme is the difficulty according to large number factorization, and the faith mechanism of having introduced the thought of layer architecture and increasing simultaneously can prevent that Denial of Service attack and congested while from significantly having reduced authentication time delay effectively.
Accompanying drawing explanation
Fig. 1 is entity authenticating system and the authentication system figure of method based on layer architecture thereof that the present invention is based on the cognitive radio networks of hierarchy.
Fig. 2 is a verification process figure of the inventive method HSAS-CRN.
Fig. 3 is the flow chart of this method HSAS-CRN of the present invention.
Embodiment
Below in conjunction with example, the invention will be further described.
If Fig. 1 is entity authenticating system and the authentication system figure of method validation system based on layer architecture thereof that the present invention is based on the cognitive radio networks of hierarchy, computer and mobile phone representative time user, except dominant base each subbase station directly a connected database be used for storing digital certificate.This digital certificate comprises PKI, user identity identification code and enciphered message.The main task of dominant base is connect all subbase stations and access major network, for example: internet or other cognitive radio networks.Between each subbase station and dominant base, have unique wireless link to carry out interaction data while dominant base and access again in other cognitive radio networks, therefore our certificate scheme of structure is the system of the opening of a layering.
As shown in Figure 2, a verification process of this method HSAS-CRN, detailed process is as follows:
(1) inferior user → registration subbase station: (ID i, drc i, Request, Time i);
(2) registration subbase station → inferior user: (ID i, Ack, Time i);
(3) registration subbase station → inferior user:
Figure GSA00000123055500051
(4) inferior user → access point: (ID i, Request, Time i);
(5) access point → inferior user: (ID i, Ack, Time i), access point → registration subbase station: (ID i, Ack, Time i);
(6) registration subbase station → access point: (Message, Time i) mAC;
(7) access point → inferior user: (Message, Time i) mAC
(8) inferior user → dominant base:
Figure GSA00000123055500052
(9) dominant base → registration subbase station: (ID i, Information, Time i);
(10) registration subbase station → dominant base:
(11) dominant base → registration subbase station:
Figure GSA00000123055500054
(12) dominant base → registration subbase station → inferior user: (ID i, Reject, Time i) mAC;
(12*) dominant base → access subbase station → inferior user: (ID i, Permit, Time i) mAC;
(13) inferior user → registration subbase station: (ID i, Request, Gather, Time i);
(14) registration subbase station → inferior user: (ID i, Respond, Gather, Time i)
(15) inferior user → registration subbase station:
Figure GSA00000123055500055
Be illustrated in figure 3 the flow chart of this method HSAS-CRN.
Suppose that certain user prepares to access a certain cognitive radio networks, the unique identify label of this user is respectively so: ID 4.Before carrying out authentication, inferior user first will obtain near subbase station its identity information of registration its private key later, and PKI is kept in the subbase station of register information.Be located at the user who registers in this subbase station outdoor except this above-mentioned use, also have three cognitive radio users.Trust value, access number of times, times of congestion, transmission time and throughput during their a certain states can be expressed as:
Figure GSA00000123055500061
Introduce time user ID below 4concrete verification process:
Suppose that this user is never linked into cognitive radio networks, they are new users.First to user ID 4access the verification process of cognitive radio networks.
(1) inferior user ID 4carry out and authorize registration algorithm, and obtain private key and establish trust value bv 4=0.
(2), when this user need to access cognitive radio networks, carry out authentication request algorithm.
(3) because this user never accesses cognitive radio networks, num 4=0, con 4=-1, Δ con 4=0, tim 4=0s and thr 4=0kb, and the intrinsic data transmission rate of this user is drc 4=45kb/s.
(4) carry out communication algorithm.All the users to this base station calculate:
Figure GSA00000123055500062
Figure GSA00000123055500063
Figure GSA00000123055500064
according to the restriction to trust value and data transmission rate in communication algorithm, by inferior user ID 1and ID 2tim turn-on time jand throughput
Figure GSA00000123055500065
and inferior user ID 4relevant parameter from registration subbase station send to dominant base.
(5) when dominant base receives the information of sending at registration subbase station, dominant base is carried out trust analysis algorithm.First calculate
Figure GSA00000123055500066
due to tim 4=0 and Δ con 4=-1, thus the trust value bv obtaining 4=1.Finally the trust value newly obtaining is transferred to registration time user ID 4subbase station, and return to trust value.
(6) act of execution decision making algorithm, by authenticity and the validity of verification public key certificate.If this certificate is true, effective, time user ID so 4to be allowed to access cognitive radio networks communicates.Carry out subsequently certificate granting algorithm, guarantee that time user can be in this cognitive radio networks share spectrum resources.
(7) when inferior user ID 4when transfer of data completes or primary user occurs, this information communication of this user finishes.Carry out information algorithm, by access point, register subbase station and will obtain its relevant parameter: num 4=1, tim 4=4s, thr 4=200kb, Δ con 4=-1, con 4=0.
Implementation by above-mentioned identifying procedure is at present in this registration subbase station, and inferior user's information is updated to:
User's name ID ID 1 ID 2 ID 3 ID 4
Trust value bv 1 0 -1 1
Access frequency n um 10 8 6 1
Times of congestion con 1 2 3 0
Turn-on time tim 100s 90s 30s 4s
Throughput thr 5000kb 3000kb 1000kb 200kb
Data transmission rate drc 50kb/s 30kb/s 40kb/s 45kb/s
Congestion change rate Δ con -0.5 -0.2 -0.4 -1
Although certain time time user ID 3want to access this cognitive radio networks, but its trust value is lower than the trust value requirement of access cognitive radio networks, therefore such user just again cannot access cognition wireless network.Now time user ID 1want to access cognitive radio networks, equally again carry out identifying procedure.
(1) first initiate authentication request, and carry out authentication request algorithm.
(2) carry out communication algorithm.All the users to this subbase station calculate:
Figure GSA00000123055500071
Figure GSA00000123055500072
Figure GSA00000123055500073
Figure GSA00000123055500074
according to the requirement to trust value and data transmission rate in communication algorithm, by inferior user ID 2, ID 3and ID 4tim turn-on time jand throughput
Figure GSA00000123055500075
and inferior user ID 1relevant parameter from registration subbase station send to dominant base.
(5) when dominant base receives the information of being sent by registration subbase station, dominant base is carried out trust analysis algorithm.First calculate
Figure GSA00000123055500076
and DRC 1≈ thr 1/ tim 1, therefore trust value bv 1=2.Again due to Δ con 1=-2.5 < 0, trust value is now bv 1=3.But due to bv 1> 1, thereby the trust value bv obtaining 4=1.Finally the trust value newly obtaining is transferred to registration time user ID 4subbase station, and return to trust value.
(6) act of execution decision making algorithm, by authenticity and the validity of verification public key certificate.If this certificate is true, effective, time user ID so 1to be allowed to access cognitive radio networks communicates.Carry out subsequently certificate granting algorithm, guarantee that time user can be in cognitive radio networks share spectrum resources.
(7) due to inferior user ID 1transfer of data completes or primary user occurs, this DTD of inferior user.Carry out information algorithm, by access point, register subbase station and will obtain its relevant parameter: num 4=11, tim 4=110s, thr 4=5200kb, con 4=2.If l=6, so Δ con 4=0.03.
Implementation by above-mentioned identifying procedure is at present in this registration subbase station, and inferior user's information is updated to:
User's name ID ID 1 ID 2 ID 3 ID 4
Trust value bv 1 0 -1 1
Access frequency n um 11 8 6 1
Times of congestion con 2 2 3 0
Turn-on time tim 110s 90s 30s 10s
Throughput thr 5200kb 3000kb 1000kb 500kb
Data transmission rate arc 50kb/s 30kb/s 40kb/s 45kb/s
Congestion change rate Δ con 0.03 -0.2 -0.4 -1

Claims (1)

1. an entity authentication method for the cognitive radio networks based on hierarchy, is characterized in that, the method comprises the following steps:
Suppose to have in cognitive radio networks n time user; Local network management center produces n to unsymmetrical key, PU iand PR irepresent respectively time user SU ipKI and private key, PU idistribute to subbase station SBS i, PR idistributed to inferior user SU i; Represent access point with AP; Identity code ID irepresent SU iunique identity characteristic, trust value bv ibe used for measuring SU itrusting degree; Request represents that request bag and Ack represent to reply bag; E k(m 1|| ... || m n) carry out encrypting messages m by key K 1... m n, wherein, between message, use cascade || connect; Time irepresent that message sends the timestamp in bag; ≈ is two metasymbols, and equation A ≈ B represents A=B+ δ, wherein 0≤δ < 10;
If data transfer rate drc irepresent time user SU itransmit under normal circumstances the speed of data and be a constant; num irepresent time user SU ithe number of times of access network; tim irepresent time user SU iobtain the service total time of Internet resources; thr ibe illustrated in time user SU ithis user's of process service data total amount when obtaining service; con irepresent the times of congestion that network occurs due to this user of access; Δ con irepresent time user SU ithe congestion change rate producing;
(1) authorize registration: work as SU ibefore access network, need described SU icorrelation properties register, and afterwards during access network, by with the described SU of storage icharacter Comparison decide SU iin whether can access network; Described SU ifirst send authentication request bag Request to nearest SBS i; Described SBS subsequently ialso give described SU ireturn to an authentication and reply bag Ack; Last described SBS ithe PU producing iand PR istorage, and PR idistribute to described SU i, put bv i=0;
(2) authentication request: described SU ito nearest AP, send data request packet; AP is to described SU subsequently iwith described SBS isend return data bag; Described SBS iby unique route return messages, give described SU i; As described SU iafter receiving this message, and send message to dominant base;
(3) communication: communication is mainly to select effectively time user profile to be transferred to dominant base; To each j (1≤j ≠ i≤n) calculate if bv i>=-C and
Figure FSB0000120033190000021
so described SBS isend parametric t im jwith
Figure FSB0000120033190000022
give dominant base, and send parameter PU i, ID i, Δ con i, tim i, thr i, bv igive dominant base; If otherwise bv ithe so described SU of <-C ifly-by-night, any message of refusal transmission simultaneously, wherein, C represents certain threshold value;
(4) trust analysis: described dominant base is received SBS described in above-mentioned steps iinformation; First obtain trust information if Δ con i< 0 puts bv so i=bv i+ 1 otherwise put bv i=bv i-1; If DRC i≈ thr i/ tim iput so bv i=bv i+ 1; Otherwise put bv i=bv i-1; If bv i> C, assignment so again, else if bv i<-C, so again assignment bv i=-(C+1), wherein, C represents certain threshold value; Described dominant base transmission trust value bv igive registration SU isubbase station;
(5) behaviour decision making: the trust value obtaining according to above-mentioned steps (4) judges whether to allow described SU iaccess cognitive radio networks; If the result of trust analysis is mistrustful, dominant base sends mistrustful message to the described SU of registration so isBS i, and send refuse information to described SU i; Otherwise described dominant base sends success message to the described SU of access isBS i, and send permission message to described SU i;
(6) information: congestion ratio and the data transmission rate of mainly being collected time user by registration subbase station; As registration subbase station SBS ireceive this transmission data complete packet time, num i=num i+ 1, tim i=tim i+ t i, thr i=thr i+ c i, wherein t itransmission time and c iit is throughput; If do not occur congested, assignment Δ con i=-1; Last described SBS istored parameter num i, con i, Δ con i, tim i, thr i.
CN201010173821.7A 2010-05-10 2010-05-10 Entity authenticating system and method of cognitive radio network based on hierarchical structure Expired - Fee Related CN101860861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010173821.7A CN101860861B (en) 2010-05-10 2010-05-10 Entity authenticating system and method of cognitive radio network based on hierarchical structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010173821.7A CN101860861B (en) 2010-05-10 2010-05-10 Entity authenticating system and method of cognitive radio network based on hierarchical structure

Publications (2)

Publication Number Publication Date
CN101860861A CN101860861A (en) 2010-10-13
CN101860861B true CN101860861B (en) 2014-05-07

Family

ID=42946450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010173821.7A Expired - Fee Related CN101860861B (en) 2010-05-10 2010-05-10 Entity authenticating system and method of cognitive radio network based on hierarchical structure

Country Status (1)

Country Link
CN (1) CN101860861B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980557B (en) * 2010-11-29 2013-05-08 武汉大学 Method for generating random number in cognitive radio network and communication key generation method
CN102096405B (en) * 2011-01-05 2013-05-01 深圳市赛远自动化系统有限公司 Remote industrial network monitoring method and system based on S-Link and VLAN (Virtual Local Area Network) technique
US9313659B2 (en) * 2011-01-20 2016-04-12 Koninklijke Philips N.V. Authentication and authorization of cognitive radio devices
CN102833816A (en) * 2011-06-17 2012-12-19 中兴通讯股份有限公司 Access method and system for cognitive radio user
CN107800471B (en) * 2017-11-17 2019-12-24 西安电子科技大学 Satellite random access congestion control method based on multi-packet reception
CN111343637A (en) * 2020-03-03 2020-06-26 福建师范大学 Method for realizing secondary user position verification in cognitive wireless network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1539216A (en) * 2001-08-03 2004-10-20 诺基亚有限公司 System and method for managing network service auess and enrollment
EP1750466A1 (en) * 2005-08-04 2007-02-07 STMicroelectronics S.r.l. Method and system for dynamic spectrum allocation, and computer program product therefor
CN101568108A (en) * 2008-04-21 2009-10-28 华为技术有限公司 Switching method and equipment between heteroid systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494862A (en) * 2008-12-05 2009-07-29 北京工业大学 Access authentication method of wireless mesh network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1539216A (en) * 2001-08-03 2004-10-20 诺基亚有限公司 System and method for managing network service auess and enrollment
EP1750466A1 (en) * 2005-08-04 2007-02-07 STMicroelectronics S.r.l. Method and system for dynamic spectrum allocation, and computer program product therefor
CN101568108A (en) * 2008-04-21 2009-10-28 华为技术有限公司 Switching method and equipment between heteroid systems

Also Published As

Publication number Publication date
CN101860861A (en) 2010-10-13

Similar Documents

Publication Publication Date Title
Lai et al. Security and privacy challenges in 5G-enabled vehicular networks
Huang et al. Recent advances and challenges in security and privacy for V2X communications
Lei et al. A blockchain based certificate revocation scheme for vehicular communication systems
Chen et al. Stochastic blockchain for IoT data integrity
Wasef et al. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]
CN101262333B (en) A secure communication method between nodes in vehicular network
CN101222331B (en) Authentication server, method and system for bidirectional authentication in mesh network
CN101056177B (en) Radio mesh re-authentication method based on the WLAN secure standard WAPI
Raya et al. Revocation games in ephemeral networks
CN101860861B (en) Entity authenticating system and method of cognitive radio network based on hierarchical structure
Quyoom et al. Security attacks and challenges of VANETs: a literature survey
Chaurasia et al. Infrastructure based authentication in VANETs
CN112752236B (en) Block chain-based networking automobile authentication method, equipment and storage medium
George et al. Secure identity management framework for vehicular ad-hoc network using blockchain
Parvin et al. Trust-based authentication for secure communication in cognitive radio networks
Vasudev et al. A lightweight authentication protocol for V2V communication in VANETs
Tangade et al. Trust management scheme in VANET: Neighbour communication based approach
Asghar et al. An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
Boubakri et al. Access control in 5G communication networks using simple PKI certificates
Bissmeyer et al. Security in hybrid vehicular communication based on ITS-G5, LTE-V, and mobile edge computing
Hamdan et al. Review of authentication with privacy-preserving schemes for 5G-enabled vehicular networks
Xi et al. Probabilistic adaptive anonymous authentication in vehicular networks
Verma An efficient secure vanet communication using multi authenticate homomorphic signature algorithm
Priya et al. Secure privacy and distributed group authentication for VANET
Pandey et al. Security challenges and solutions for next-generation VANETs: an exploratory study

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140507

Termination date: 20160510

CF01 Termination of patent right due to non-payment of annual fee