Cognitive Radio Networks is an emerging technology which gives a remarkable solution to many problems that arises at the time of communication between the primary and secondary user. To affect the confidentiality and integrity of the network, many attacks come to the communication channel. In this paper, we focus on the secure communication between primary and secondary user. If the communication is not secure, then any unwanted user can pretend like a primary user or secondary user and can use that confidential data or can block the legal user. So with the help of AES and key file generation, the encryption and decryption can be done only by the legal primary and the secondary user.
CITATION STYLE
Malhotra, M., & Aulakh, I. K. (2016). Secure spectrum leasing in cognitive radio networks via secure primary–secondary user interaction. In Advances in Intelligent Systems and Computing (Vol. 394, pp. 735–741). Springer Verlag. https://doi.org/10.1007/978-81-322-2656-7_67
Mendeley helps you to discover research relevant for your work.