The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper sheds light on the artificial mapping schemes for adaptive network collaboration of cognitive radio networks. The analysis shows that the superiority of the DHT-based overlay is due to its link state aggregation property, which establishes global convergence for link state aggregation among a scalable number of nodes. Recognizing that fuzzy logic inference can better handle uncertainty,...
A new random number generate algorithm based on users' location information and spectrum information (ULSI) for cognitive radio networks is proposed in [1, 2].Through experiments analysis, the paper draws the conclusion that: random numbers generated from ULSI algorithm has good performance in statistical distribution. According the random numbers generated from ULSI algorithm, different types of...
Cognitive Radio Networks (CRNs) emerge as a possible solution for the lack of spectrum, and make different networks merge. However, security becomes the key problem need to be solved. Cognitive radio networks face not only traditional network security intrusion problems, but also unique security risks. In this paper, we investigate security issues in different classes which including spectrum security...
Rapid development of wireless communication technology makes our life convenient. However, it causes two issues: one is shortage of spectrum resources leads to the waste of allocated spectrum resources; the other is wireless communication standards are incompatible. Those two issues can be solved by cognitive radio networks. In this paper, current state of cognitive radio networks is discussed detailed...
Rapid development of Wireless communication leads to more and more wireless standards appear, and security architecture of different standards are not compatible. In this paper, compatibility of security architecture for cognitive radio network is discussed and a unified security architecture is proposed. BAN logic analysis verifies the proposed architecture is adaptable, scalable, and suitable for...
Identity authentication is one of the key problems to be solved in cognitive radio networks. Current authentication mechanisms for cognitive radio networks are based on PPP Extensible Authentication Protocols. Future cognitive radio network can fusion current wireless standards. However, security requirements of various wireless standards are different which leads to current authentication mechanisms...
Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, a new authentication mechanism for cognitive radio networks is proposed which is based on third-party Certification Authority (CA). In...
Cognitive radio networks (CRN) is built on cognitive radio technology which could provide a good solution for heterogeneous networks merging. However, heterogeneous networks merging leads to security standards of the different networks are not compatible. This paper focuses on security architecture of different heterogeneous networks and proposes unified layered security architecture for the future...
Identity authentication is the key point for secure communications in cognitive radio networks (CRN). PPP Extensible Authentication Protocols are widely used in wireless networks recently. Cognitive radio networks are able to merge various wireless network standards whose security certification requirements are different. Therefore, current authentication mechanisms are not suitable for cognitive...
Cognitive radio networks (CRN) brings rapid development of communication technologies and provides a good solution for heterogeneous networks merging. However, security of CRN becomes the key concern issue. Security of the encryption key is one of the most important factors in communication. Through analysis, we found that: key generation of cognitive radio networks is more dependent on the network...
A new random number generate algorithm (ULSI) which is based on users' location information and spectrum information is proposed in [1] .In this paper, we continue analyze uniform test results and compares ULSI algorithm with PMMLCG, GFSRG, and Super-prime method. Simulation results show that ULSI algorithm has better performance in uniform statistical distribution.
Some typical MAC protocols have been proposed for multi-hop CR network recently. In a multi-hop MAC protocol, a node uses the common control channel to perform channel negotiation before data transmission. Recent research findings indicate that insecure transmission of control channels open vulnerable holes for the Denial of Service attacks. This paper makes a security analysis for CR network MAC...
Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, which bring new research challenges in MAC design. In this paper, we firstly introduce the differences between the conventional multi-channel MAC protocols and the MAC protocols for OSA as well as the requirements for OSA MAC protocols, and then...
Cognitive radio networks is recognized as the technology to solve the problem of spectrum shortage and promote the efficient use of the spectrum. However, the research of CR networks technologies only stays in the theoretical stage recently. Therefore, developing a CR networks platform becomes an urgent problem to solve. Several CR platforms have being deployed by the research community. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.