|
|
Light and secure communication algorithm for cognitive radio network by using labyrinthine authentication formula
|
|
|
|
|
نویسنده
|
khan f.s. ,naqash t. ,khatak m.i. ,larik r.m.
|
منبع
|
jurnal teknologi - 2015 - دوره : 76 - شماره : 1 - صفحه:25 -30
|
چکیده
|
Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. usage of licensed spectrum is increasing day by day so cognitive radio is proposed as a solution to meet the demands. cr is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. in this paper,we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. the conceivable results incorporate coordinating the benefits of spread range balance,utilizing encryption calculations (encryption keys),and its possibility to switch over different recurrence groups. we concentrate on the different requisitions of cr and the various philosophies which empower a safe communication system. © 2015 penerbit utm press. all rights reserved.
|
کلیدواژه
|
Authentication; Cognitive radio network; Security
|
آدرس
|
department of computer science, Pakistan, department of computer science, Pakistan
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|