Font Size: a A A

The Research On The Key Agreement And Authentication Of Cognitive Radio Networks

Posted on:2011-05-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:L ZhuFull Text:PDF
GTID:1228360305483566Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of communication technologies, spectrum resources become more and more scarce. At the same time, the communication specifications are complex and cumbersome, which causes different networks couldn’t communicate with each others easily. Pursuing for the high utilization of spectrum, the concept of cognitive radio (CR) is proposed by some literatures. They regard that CR is a smart radio which has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according to the current state of the environment. Cognitive radio networks (CRN) is built on cognitive radio technology which could provide a good solution for heterogeneous networks merging.These technologies brought great convenience to our lives; however, security of CRN becomes the key concern issue. CRN is built on the existing network infrastructure; therefore, the future CRN will also face the security problems that exist in the current wireless network. In addition, the cognitive radio networks can dynamically program and use the spectrum, so, security of spectrum become the key issue that will restrict development of the future network. Therefore, security of spectrum access for CRN and security of identify authentication for core network have extraordinary significance.This dissertation gives a detailed analysis on the security issues of the future cognitive radio networks, and also proposes some effective solutions and suggestions. The research includes the key generation and management of CRN; the authentication mechanism; the unified security architecture of the cognitive radio networks.Finally, all the proposed methods of the paper are proved by BAN logic.Firstly, the fundamental security issues are analyzed for the cognitive networks in the future, which include access security, transmit security and authentication mechanism. And the security risks exist in spectrum and network merging are mainly discussed. Then the solutions are proposed. Spectrum sub-layer is put forward in order to manage the spectrum, and a third authentication mechanism is proposed to resolve the security problems in the core networks merging.Secondly, various encryption algorithms are introduced, and a new random number generate algorithm which is based on user location information and spectrum information is proposed. According to this algorithm, different types of keys are produced. The processes of key distribution, key updating and key destruction are given. Simulation and comparison results indicate that the proposed algorithm has better performance than other methods.Thirdly, an improved mutual authentication mechanism is present based on authentication mechanism of 802.16. The base station is authenticated by the third-party awarding certificates to it, which prevents forge base station. Mean while, the tunneled-transport method is adopt to assure confidential information not disclosed during transmission.Then, a unified security architecture is constructed for the future cognitive radio networks. The architecture consists of two security sub-layers:security of application layer (sub-layer 1) and physical layer (sub-layer 2). Sub-layer 1 focuses on the encryption algorithms, key management, authentication, data encryption and policy strategies. Sub-layer 2 is responsible for spectrum detection, spectrum distribution, and spectrum recycling. Based on this new architecture, the security components of cognitive radio networks are given.After that, the present methods including authentication mechanism and security architecture of cognitive radio networks are proved by BAN logic.Finally, this paper discusses the research trends of security in the future cognitive radio network.
Keywords/Search Tags:identity authentication, security architecture, Cognitive Radio Networks, BAN Logic analysis, Key Management
PDF Full Text Request
Related items