Font Size: a A A

Research On Security Technologies In Cognitive Radio Networks

Posted on:2013-07-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:L TangFull Text:PDF
GTID:1228330452963453Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless spectrum resource is becoming increasingly scarce with the rapiddevelopment of wireless communications services. Meanwhile, the diversity of thecommunication standard makes it more difficult in communications betweenheterogeneous networks. Cognitive radio network is put forward to deal with it. Onone hand, dynamic spectrum access can solve the problem with the shortage ofspectrum. On the other hand, cognitive radio network, based on cognitive radiotechnology, makes convergence available in present wireless networks. Thesetechnologies promote the rapid development of the communication industry andmake a great convenience for the people’s life. Under this circumstance, securitycommunication is winning more and more focuses. Cognitive radio network is builton the present wireless networks, so the security problem of wireless networks isstill existing in the future cognitive wireless network. Furthermore, unlike thecurrent wireless network, cognitive wireless network has the ability to beprogrammed and used dynamically, so spectrum safety is a key issue when studyingit. Therefore, it is significant to pay attention to study security technologies forcognitive wireless network in order to better utilize it.This paper analyzes the security issues of future cognitive wireless networksand presents the corresponding methods and solutions. The main contents include:(1) It proposes a security framework in cognitive wireless networks;(2) It researcheson the security field for dynamic spectrum access in cognitive wireless networks;(3)it studies the identity and authentication based on IEEE802.22in cognitive wirelessnetworks. The main work is described as below.Firstly, the security problems in future cognitive wireless networks arediscussed in combination with the existing wireless networks. Particularly, itdiscusses existing solutions and puts forward the main countermeasures by theanalysis of security issues of real-time sense and intelligent regulation of spectrum.Secondly, the security system framework of cognitive wireless network isstudied. In line with the existing security of network system structures, it putsforward the future security framework of cognitive wireless network, and detailsevery level of it. Meanwhile, focusing on security problems in cognitive network,this paper puts forward the main security mechanism of principles and basicsolutions in the specific design and implementation.Then, it studies security agreement framework of dynamic spectrum sensingdecision in cognitive wireless networks. According to the existing research, it puts forward a security agreement framework for dynamic spectrum sensing decision,and analyzes every level of it. At the same time, this paper compares it with existingresearch framework, and makes security analysis and gives the proof for it.After that, the trust-based model in cognitive wireless networks is studied. Bythe third trusted certification party, a trust value database is established for eachnode, aiming to achieve the management for every node in the network. When newnodes want to access into the cognitive wireless network, cognitive authorizedcenter will judge its validity by its trust value, and those whose value is overthreshold can access the resource successfully. By the predefined rules of access andexit, the node trust value will be updated automatically to guarantee the network’sdynamic security. This presented trust model can effectively prevent malicious nodeto attack, and unified third party authentication management can make the whole netsecurity level rise. It provides a great difficulty for false identity and tamper identity.A case study is carried out to demonstrate the feasibility and efficiency of thepresented model, and it also gives a detail analysis for it.Next, the identity authentication protocol is studied. Due to the need of thefusion of existing wireless standards, it’s essential to handle the issue ofcompatibility with current identity authentication protocol. The problem of identityauthentication protocol is discussed based on IEEE802.22, and a lightweight identityauthentication protocol is proposed to ensure true identity for both sides incommunication and provide identity privacy and location privacy protection. Inaddition, the security and performance function of identity authentication protocol isdiscussed.Finally, this paper discusses the trend and area of security research in futurewireless networks.
Keywords/Search Tags:Cognitive Radio Networks, Security Structure, Spectrum Sensing, Trust model, Identity Authentication
PDF Full Text Request
Related items