Abstract | ||
---|---|---|
The dynamic spectrum access DSA paradigm of the cognitive radio CR contributes intrinsic security capability to the CR network by hiding information in the unpredictable spectrum access patterns. This paper formalizes the frequency hopping DSA FH-DSA-based cryptography by introducing the model of dynamic bit dybit, whose state indicates both the binary value and the DSA strategy. Taking advantage of uncertainty of the dybit state, FH-based key distribution FH-KE mechanisms are proposed to establish secrets among communication attendants. Based on the group FH-KE GKE, a confidentiality-oriented DSA scheme, GKE-DSA is developed to realize the FH-DSA cryptography-based secure data communication. The GKE-DSA can conceal the DSA strategy of each communication link from others while limiting the data packet collisions through GKE-based negotiation. Copyright © 2016 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1002/sec.1595 | Security and Communication Networks |
Keywords | Field | DocType |
cognitive radio,dynamic spectrum access,frequency hopping,secure data communication | Communication link,Key distribution,Computer science,Computer security,Cryptography,Network packet,Computer network,Cryptosystem,Frequency-hopping spread spectrum,Negotiation,Cognitive radio | Journal |
Volume | Issue | ISSN |
9 | 17 | 1939-0114 |
Citations | PageRank | References |
0 | 0.34 | 2 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chao Zou | 1 | 44 | 4.60 |
Chunxiao Chigan | 2 | 195 | 20.62 |