CN104540130A - Self coexistence channel selection method based on Hash matching in cognitive radio network - Google Patents

Self coexistence channel selection method based on Hash matching in cognitive radio network Download PDF

Info

Publication number
CN104540130A
CN104540130A CN201510004600.XA CN201510004600A CN104540130A CN 104540130 A CN104540130 A CN 104540130A CN 201510004600 A CN201510004600 A CN 201510004600A CN 104540130 A CN104540130 A CN 104540130A
Authority
CN
China
Prior art keywords
hash
channel
random number
cognitive
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510004600.XA
Other languages
Chinese (zh)
Inventor
李红宁
裴庆祺
徐蕾蕾
马立川
谢敏
王祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201510004600.XA priority Critical patent/CN104540130A/en
Publication of CN104540130A publication Critical patent/CN104540130A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0006Assessment of spectral gaps suitable for allocating digitally modulated signals, e.g. for carrier allocation in cognitive radio

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a self coexistence channel selection method based on Hash matching in a cognitive radio network and relates to the field of safety of the cognitive radio network. The method includes the following steps that S1, a CA generates and distributes a random number sequence matrix R to M cognitive users, and the CA calculates and sends the Hash to a DB; S2, the cognitive user SUj carries out channel application; S3, a BSj collects all channel application information received at the time of t, and processes and sends the channel application information to the DB; S4, the DB carries out identity authentication and information feedback; S5, channels are distributed to the cognitive users passing authentication; S6, the BSj registers channel use information in the DB. The self coexistence channel selection method based on Hash matching in the cognitive radio network can effectively prevent position privacy leakage of the cognitive users, can better adapt to cognitive radio network with dynamic spectrum changes considering the aspects of calculation complexity, communication expenses and the like, and is easy to operate and convenient to use by people.

Description

Based on the channel selecting method that certainly coexists of Hash coupling in cognitive radio networks
Technical field
The present invention relates to cognition wireless network security fields, be specifically related in a kind of cognitive radio networks based on the channel selecting method that certainly coexists that Hash (hash) mates.
Background technology
Along with the increase of wireless communication needs, wireless channel is more and more crowded; In order to solve the in great shortage problem of frequency spectrum resource, cognition wireless network is applied and gives birth to.Based on most of frequency range fixed allocation to the reality of authorized user (primary user), cognition wireless network allows unauthorized user (cognitive user) under the prerequisite not affecting primary user, wait for an opportunity insertion authority frequency range, thus alleviate the nervous problem of frequency spectrum resource, improve resource utilization.
When cognition wireless network uses, because the uncertainty of primary user's behavior, so the usable spectrum of cognitive user can become along with the time; Meanwhile, the mobility of cognitive user also makes usable spectrum constantly change.The mobility of spectrum agile and cognitive user is that cognition wireless network brings more challenge; Due to the regional change of usable spectrum, between the position of user and its frequency spectrum used, there is indivisible contact, namely use information can obtain the relevant geographical location information of user by the channel of user.Assailant utilizes this feature of cognitive radio, can judge and locate cognitive user, thus send refuse messages, deceptive information is provided, infer user address, job site, occupation and social information etc., the privacy of the user that constitutes a serious infringement, and cause the harm that can not estimate.
In the frequency spectrum distributing method that DB (Data Base, database) drives, cognitive user needs access idle channel to communicate with other cognitive user, first needs to send the channel request comprising positional information to base station.After base station receives channel request information, forwarding information, to DB, obtains the SAI (Spectrum AvailabilityInfor-mation, usable spectrum information) of this cognitive user region, and SAI is sent to cognitive user from DB.Cognitive user selects a channel according to SAI, and in DB, register this channel.
Because frequency spectrum uses the position of information and cognitive user closely related, if so DB is interested in the frequency spectrum collecting cognitive user use information, or malicious user uses information for the frequency spectrum being obtained cognitive user by DB, the positional information of cognitive user will be caused to leak, thus cause associated privacy information to expose.Such as, certain company wants that the industry such as employee, the amusement food and drink attempt of following the trail of oneself is the positional information etc. that the equipment such as the intelligent terminal of cognitive user inject the acquisition user of advertising message and other objects.Therefore, in cognitive radio networks, the protection of privacy information is even more important.
Assailant, by the channel usage of cognitive user, infers the position of cognitive user, thus accurately locates, and this kind of attack is that the customer location privacy caused because channel uses the leakage of information exposes problem.
At present, the method avoiding cognitive radio networks under attack is generally: in the cognitive radio networks that DB drives, utilize the blind factor to hide the positional information of user, propose a kind of frequency spectrum based on prediction simultaneously and use agreement, the channel more stable by selection mode reduces switching, thus reduces the probability that assailant successfully infers cognitive user positional information.
But said method utilizes channel degree of stability to carry out Channel assignment, operation more complicated, is not easy to people and uses after needing to judge the stability of channel according to the frequency of utilization of each cognitive user storage available channel.
Summary of the invention
For the defect existed in prior art, the object of the present invention is to provide the channel selecting method that certainly coexists based on Hash coupling in a kind of cognitive radio networks.The present invention carrys out the identity of hiding cognitive user by Hash coupling and temporary labels; When the present invention uses, DB passes through from coexistence mechanism allocated channel and utilizes base station uniform registration mode, the location privacy of protection cognitive user.Analysis shows, effectively can not only prevent the location privacy of cognitive user from leaking, and operate fairly simple, is convenient to people and uses.
For reaching above object, based on the channel selecting method that certainly coexists of Hash coupling in cognitive radio networks provided by the invention, comprise the following steps:
S1: authentication center CA generates random number sequence matrix R, R={R mn, (1≤m≤N), (1≤n≤N); CA calculates hash Hash matrix H according to R and H is sent to database D B; M × n random number is randomly assigned to M cognitive user with behavior unit by R by CA, cognitive user SU jthe random number sequence set note R obtained j(1≤j≤M), forwards step S2 to;
S2:SU jby the region C of control channel to its place jin base station BS j, send the channel request information E of encryption bSj(R j1, t), t is the time, forwards step S3 to;
S3:BS jcollect all E that t receives bSj, and will receive sequence string deciphering, obtain series of secondary user profile R secondary; BS jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message; BS jby each R secondaryenciphered message be sent to DB, forward step S4 to;
After S4:DB is decrypted the random number in enciphered message, carry out the hash value that Hash calculates random number, after the hash value of random number mates with the hash value of H, the user of corresponding label is by checking; DB is by the label by verifying and C jin usable spectrum information encryption formed after available channel information, be sent to BS j, DB deletes the hash value mated in H, forwards step S5 to;
S5:BS jaccording to the cognitive user allocated channel that available channel information is by checking, forward step S6 to;
S6:BS jin DB, registration channel uses information.
On the basis of technique scheme, in step S1, the formula of CA calculating Hash matrix H is:
H = H ( R ) = h ( R 11 ) h ( R 12 ) . . . . . . h ( R 1 N ) h ( R 21 ) h ( R 22 ) . . . . . . h ( R 2 k ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . h ( R M 1 ) h ( R M 2 ) . . . . . . h ( R MN ) .
On the basis of technique scheme, the BS in step S3 jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message, specifically comprise the following steps: BS jselect label tag j1stamp label to random number, enciphered message is
On the basis of technique scheme, after the hash value of the random number in step S4 mates with the hash value of H, the user of corresponding label, by checking, specifically comprises the following steps: whether the match is successful to judge the hash value of the hash value of random number and H, and if so, DB is to BS jsend the enciphered message of set of available channels , wherein S jfor C jset of available channels in scope; Otherwise DB is to BS jsend
On the basis of technique scheme, step S5 specifically comprises the following steps: BS jdeciphering available channel information, checking tag j1whether the match is successful, if so, at C js in scope jthe most suitable channel ch of middle selection one j, by ch jenciphered message after encryption is sent to SU j, enciphered message is ; Otherwise not allocated channel information.
On the basis of technique scheme, the channel registered in step S6 uses information as E dB(BS j, ch, t).
On the basis of technique scheme, further comprising the steps of after step S6:
S7: finish using when there is cognitive user Hash sequence, or the increase of new user, when needing again to apply for Hash sequence string to CA, CA upgrades Hash matrix and is sent to DB.
Compared with prior art, the invention has the advantages that:
(1) the present invention adopts Hash to mate, and can ensure that validated user can smoothly by checking; When the present invention uses, the individual channel of DB not stored user uses information, avoids the problem of leaking customer location privacy because channel uses information; Meanwhile, the present invention adopts random number Hash to verify, DB and BS allocated channel not only can be made to legal cognitive user, and add the difficulty of assailant.Even if obtain the positional information of user, assailant also cannot obtain the identity of user.
(2) the present invention is after channel allocation terminates, adopt the mode of base station login, log-on message in DB only comprises the channel list used in base station and institute's coverage thereof, there is no with cognitive user itself and contact directly, therefore, assailant cannot obtain the information of any associated subscriber position from log-on message.
(3) territory, network partition of the present invention and adopt from coexistence mechanism be each region allocation available channel, operating process is fairly simple, be convenient to people use, frequency spectrum resource can not only be made full use of, can ensure that again the communication between cognitive user is interference-free, the basis of maximum resource utilance improves QoS of customer.
Accompanying drawing explanation
Fig. 1 is the exemplary plot of the cognitive radio networks in the embodiment of the present invention;
Fig. 2 is the flow chart based on the channel selecting method that certainly coexists of Hash coupling in the cognitive radio networks in the embodiment of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
Shown in Figure 1, the cognitive radio networks in the embodiment of the present invention, is disposed N number of BS (subbase station), is connected between all BS by wired or dedicated channel in the C of network area.Sub-base station BS ithe coverage of (1≤i≤N) is defined as C i, C iinterior all cognitive user can by control channel to BS itransmitting channel application information, and by idle channel and BS icommunication.
Cognitive user communicates with fixing transmitting power, ensure that the signal in each region can not have influence on adjacent region, and the available channel of adjacent area is not overlapping, namely adopts between cognitive user and communicate from coexistence mechanism.In channel request process, the usable spectrum information of the regional that DB sends to BS is the information by distributing from coexistence mechanism.
The track user attack process that the present invention considers is as follows: because comprise the complete positional information of cognitive user in channel request process, and the identity and the channel that comprise cognitive user in log-on message use information.In the privacy leakage attack that the latter causes because channel uses the leakage of information, the channel information that assailant can use according to cognitive user history and overall available channel conditions, extrapolate the particular location of cognitive user.Such as, if at PU junder signal existent condition, cognitive user still can access channel C j, then cognitive user must at region A isupplementary set within.
Shown in Figure 2, based on the channel selecting method that certainly coexists of Hash coupling in the cognitive radio networks in the embodiment of the present invention, comprise the following steps:
S1:CA (CertificateAuthority, authentication center) generates random number sequence matrix R, R={R mn, (1≤m≤N), (1≤n≤N); CA calculates Hash matrix H according to R and H is sent to DB.M × n random number is randomly assigned to M cognitive user with behavior unit by R by CA, cognitive user SU jthe random number sequence set note R obtained j(1≤j≤M), , forward step S2 to.
S2:SU jby the region C of control channel to its place jin base station BS j, send the channel request information E of encryption bSj(R j1, t), t is the time, forwards step S3 to.
S3:BS jcollect all E that t receives bSj, and will receive sequence string deciphering, obtain series of secondary user profile R secondary.BS jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message; BS jby each R secondaryenciphered message be sent to DB, forward step S4 to.
After S4:DB is decrypted the random number in enciphered message, carry out the hash value that Hash calculates random number, after the hash value of random number mates with the hash value of H, the user of corresponding label is by checking.DB is by the label by verifying and C jin usable spectrum information encryption formed after available channel information, be sent to BS j, DB deletes the hash value mated in H, forwards step S5 to.
S5:BS jaccording to the cognitive user allocated channel that available channel information is by checking, forward step S6 to.
S6:BS jin DB, registration channel uses information, so that DB uses information to carry out coordinated allocation to global channel, forwards step S7 to.
S7: finish using when there is cognitive user Hash sequence, or the increase of new user, when needing again to apply for Hash sequence string to CA, CA upgrades Hash matrix and is sent to DB.
In step S1, the formula of CA calculating Hash matrix H is:
H = H ( R ) = h ( R 11 ) h ( R 12 ) . . . . . . h ( R 1 N ) h ( R 21 ) h ( R 22 ) . . . . . . h ( R 2 k ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . h ( R M 1 ) h ( R M 2 ) . . . . . . h ( R MN ) .
BS in step S3 jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message, specifically comprise the following steps: BS jselect label tag j1stamp label to random number, enciphered message is , BS jlabel and corresponding random number (R need be recorded j1, tag j1) in order to the detection of link below.
After in step S4, the hash value of random number mates with the hash value of H, the user of corresponding label, by checking, specifically comprises the following steps: whether the match is successful to judge the hash value of the hash value of random number and H, and if so, DB is to BS jsend the enciphered message of set of available channels , wherein S jfor C jset of available channels in scope; Otherwise DB is to BS jsend
Step S5 specifically comprises the following steps: BS jdeciphering available channel information, checking tag j1whether the match is successful, if so, at C js in scope jthe most suitable channel ch of middle selection one j, by ch jenciphered message after encryption is sent to SU j, enciphered message is otherwise not allocated channel information.
Channel in step S6 uses information to be E dB(BS j, ch, t).
Operation principle of the present invention is as follows:
Use information as can be seen from the individual channel of step S1 ~ S4, DB not stored user, avoid the problem of leaking customer location privacy because channel uses information; Meanwhile, the present invention adopts random number Hash to verify, DB and BS allocated channel not only can be made to legal cognitive user, and add the difficulty of assailant.Even if obtain the positional information of user, assailant also cannot obtain the identity of user.
Step S5 can carry out channel allocation according to the demand of coloring models and BS, different B S can multipling channel under not interactional condition, and number of available channels, BS coverage and BS number, BS channel demands etc. all can have influence on the probability that cognitive user positional information is revealed.
As can be seen from step S6, if the channel registration information that assailant obtains from DB, be merely able to the channel usage drawing each base station, the channel with cognitive user can not be obtained and use information, therefore, only obtain channel registration information, cannot cognitive user be located.If assailant gets the full detail of DB, the cognitive user that then known all random numbers are corresponding is in the coverage of which base station, but it does not know the relation of random number and user, namely know in each base station have how many cognitive user at use channel, but do not know it is all who is at use channel.
The present invention is not limited to above-mentioned execution mode, and for those skilled in the art, under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications are also considered as within protection scope of the present invention.The content be not described in detail in this specification belongs to the known prior art of professional and technical personnel in the field.

Claims (7)

1. in cognitive radio networks based on Hash coupling the channel selecting method that certainly coexists, it is characterized in that, comprise the following steps:
S1: authentication center CA generates random number sequence matrix R, R={R mn, (1≤m≤N), (1≤n≤N); CA calculates hash Hash matrix H according to R and H is sent to database D B; M × n random number is randomly assigned to M cognitive user with behavior unit by R by CA, cognitive user SU jthe random number sequence set note R obtained j(1≤j≤M), forwards step S2 to;
S2:SU jby the region C of control channel to its place jin base station BS j, send the channel request information E of encryption bSj(R j1, t), t is the time, forwards step S3 to;
S3:BS jcollect all E that t receives bSj, and will receive sequence string deciphering, obtain series of secondary user profile R secondary; BS jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message; BS jby each R secondaryenciphered message be sent to DB, forward step S4 to;
After S4:DB is decrypted the random number in enciphered message, carry out the hash value that Hash calculates random number, after the hash value of random number mates with the hash value of H, the user of corresponding label is by checking; DB is by the label by verifying and C jin usable spectrum information encryption formed after available channel information, be sent to BS j, DB deletes the hash value mated in H, forwards step S5 to;
S5:BS jaccording to the cognitive user allocated channel that available channel information is by checking, forward step S6 to;
S6:BS jin DB, registration channel uses information.
2. the channel selecting method that certainly coexists mated based on Hash in cognitive radio networks as claimed in claim 1, is characterized in that: in step S1, the formula of CA calculating Hash matrix H is:
3. the channel selecting method that certainly coexists mated based on Hash in cognitive radio networks as claimed in claim 1, is characterized in that: the BS in step S3 jfor each R secondaryall stamp re-encrypted after label, each R secondarylabel and corresponding random number information form enciphered message, specifically comprise the following steps: BS jselect label tag j1stamp label to random number, enciphered message is
4. the channel selecting method that certainly coexists mated based on Hash in cognitive radio networks as claimed in claim 3, it is characterized in that: after the hash value of the random number in step S4 mates with the hash value of H, the user of corresponding label is by checking, specifically comprise the following steps: whether the match is successful to judge the hash value of the hash value of random number and H, if so, DB is to BS jsend the enciphered message of set of available channels wherein S jfor C jset of available channels in scope; Otherwise DB is to BS jsend
5. the channel selecting method that certainly coexists mated based on Hash in cognitive radio networks as claimed in claim 3, it is characterized in that, step S5 specifically comprises the following steps: BS jdeciphering available channel information, checking tag j1whether the match is successful, if so, at C js in scope jthe most suitable channel ch of middle selection one j, by ch jenciphered message after encryption is sent to SU j, enciphered message is otherwise not allocated channel information.
6. the channel selecting method that certainly coexists mated based on Hash in cognitive radio networks as claimed in claim 5, is characterized in that: the channel in step S6 uses information to be E dB(BS j, ch, t).
7., based on the channel selecting method that certainly coexists of Hash coupling in the cognitive radio networks as described in any one of claim 1 to 6, it is characterized in that, further comprising the steps of after step S6:
S7: finish using when there is cognitive user Hash sequence, or the increase of new user, when needing again to apply for Hash sequence string to CA, CA upgrades Hash matrix and is sent to DB.
CN201510004600.XA 2015-01-06 2015-01-06 Self coexistence channel selection method based on Hash matching in cognitive radio network Pending CN104540130A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510004600.XA CN104540130A (en) 2015-01-06 2015-01-06 Self coexistence channel selection method based on Hash matching in cognitive radio network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510004600.XA CN104540130A (en) 2015-01-06 2015-01-06 Self coexistence channel selection method based on Hash matching in cognitive radio network

Publications (1)

Publication Number Publication Date
CN104540130A true CN104540130A (en) 2015-04-22

Family

ID=52855565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510004600.XA Pending CN104540130A (en) 2015-01-06 2015-01-06 Self coexistence channel selection method based on Hash matching in cognitive radio network

Country Status (1)

Country Link
CN (1) CN104540130A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105517113A (en) * 2016-01-06 2016-04-20 广东欧珀移动通信有限公司 Access control method and terminal equipment
CN107846660A (en) * 2017-12-19 2018-03-27 柯钢 A kind of Internet of Things method for transmitting signals and system based on wireless network
CN108259173A (en) * 2018-01-23 2018-07-06 武汉城市职业学院 A kind of mobile Intelligent campus system based on Internet of Things
CN108335247A (en) * 2018-03-14 2018-07-27 黄冈职业技术学院 A kind of computer teaching lecture system based on cloud platform
CN108429750A (en) * 2018-03-13 2018-08-21 湖南城市学院 A kind of music control system and control method based on big data
CN108650096A (en) * 2018-04-23 2018-10-12 广东水利电力职业技术学院(广东省水利电力技工学校) A kind of industrial field bus control system
CN109359088A (en) * 2018-10-17 2019-02-19 武汉市快讯通信息技术有限公司 A kind of increased value service system and value-added service method based on mobile radio communication
CN109656717A (en) * 2018-12-18 2019-04-19 广东石油化工学院 A kind of containerization cloud resource distribution method
CN109818697A (en) * 2019-01-02 2019-05-28 西安电子科技大学 Cognition wireless network location privacy protection method based on secure two party computation
CN111028228A (en) * 2019-12-19 2020-04-17 江苏医药职业学院 Matching processing method of medical image system based on big data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980557A (en) * 2010-11-29 2011-02-23 武汉大学 Method for generating random number in cognitive radio network and communication key generation method
US20110047594A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for mobile communication device application advisement
CN103179633A (en) * 2012-12-28 2013-06-26 重庆邮电大学 Joint channel allocation cognitive radio network routing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110047594A1 (en) * 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for mobile communication device application advisement
CN101980557A (en) * 2010-11-29 2011-02-23 武汉大学 Method for generating random number in cognitive radio network and communication key generation method
CN103179633A (en) * 2012-12-28 2013-06-26 重庆邮电大学 Joint channel allocation cognitive radio network routing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李红宁: "认知无线电网络安全与隐私保护技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105517113A (en) * 2016-01-06 2016-04-20 广东欧珀移动通信有限公司 Access control method and terminal equipment
CN107846660A (en) * 2017-12-19 2018-03-27 柯钢 A kind of Internet of Things method for transmitting signals and system based on wireless network
CN108259173A (en) * 2018-01-23 2018-07-06 武汉城市职业学院 A kind of mobile Intelligent campus system based on Internet of Things
CN108429750A (en) * 2018-03-13 2018-08-21 湖南城市学院 A kind of music control system and control method based on big data
CN108335247A (en) * 2018-03-14 2018-07-27 黄冈职业技术学院 A kind of computer teaching lecture system based on cloud platform
CN108650096A (en) * 2018-04-23 2018-10-12 广东水利电力职业技术学院(广东省水利电力技工学校) A kind of industrial field bus control system
CN109359088A (en) * 2018-10-17 2019-02-19 武汉市快讯通信息技术有限公司 A kind of increased value service system and value-added service method based on mobile radio communication
CN109656717A (en) * 2018-12-18 2019-04-19 广东石油化工学院 A kind of containerization cloud resource distribution method
CN109818697A (en) * 2019-01-02 2019-05-28 西安电子科技大学 Cognition wireless network location privacy protection method based on secure two party computation
CN109818697B (en) * 2019-01-02 2021-06-15 西安电子科技大学 Cognitive wireless network position privacy protection method based on safe two-party calculation
CN111028228A (en) * 2019-12-19 2020-04-17 江苏医药职业学院 Matching processing method of medical image system based on big data

Similar Documents

Publication Publication Date Title
CN104540130A (en) Self coexistence channel selection method based on Hash matching in cognitive radio network
Yu et al. MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
CN105100112B (en) RFID cluster label ownership transfer methods based on cloud storage
Jiang et al. Preserving location privacy in wireless LANs
CN104010299B (en) Mobile communication session privacy Enhancement Method based on safety of physical layer
US10944551B2 (en) Flexible security channel establishment in D2D communications
CN104247369A (en) Method and equipment for blurring equipment tags
CN110381447B (en) Wireless spectrum access method and system based on block chain
CN103179558A (en) Method and system for cluster system implementing group calling encryption
CN103314606A (en) Authentication and authorization of cognitive radio devices
CN103155686A (en) Apparatus and method for communication
CN105794273A (en) Method and apparatus for application recognition QOS-differentiated device-to-device communication in wireless communication system
Safdar et al. Common control channel security framework for cognitive radio networks
KR101807523B1 (en) Apparatus and method for identifying wireless network provider in wireless communication system
CN101980557B (en) Method for generating random number in cognitive radio network and communication key generation method
Premarathne et al. Secure and reliable surveillance over cognitive radio sensor networks in smart grid
CN104255059A (en) Presence platform for passive radio access network-to-radio access network device transition
Fragkiadakis et al. Securing cognitive wireless sensor networks: A survey
Niu et al. Defending jamming attack in wide-area monitoring system for smart grid
US9530026B2 (en) Privacy protection for participatory sensing system
CN110730450B (en) Mobile communication method and system
Saini et al. Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad‐hoc network
CN103916839A (en) Method and apparatus for releasing service information
Liu et al. Bilateral privacy-utility tradeoff in spectrum sharing systems: A game-theoretic approach
CN109474635A (en) A kind of electrical equipment distribution method and system based on barcode scanning technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150422

RJ01 Rejection of invention patent application after publication