Secure spectrum leasing in cognitive radio networks via secure primary–secondary user interaction

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cognitive Radio Networks is an emerging technology which gives a remarkable solution to many problems that arises at the time of communication between the primary and secondary user. To affect the confidentiality and integrity of the network, many attacks come to the communication channel. In this paper, we focus on the secure communication between primary and secondary user. If the communication is not secure, then any unwanted user can pretend like a primary user or secondary user and can use that confidential data or can block the legal user. So with the help of AES and key file generation, the encryption and decryption can be done only by the legal primary and the secondary user.

Cite

CITATION STYLE

APA

Malhotra, M., & Aulakh, I. K. (2016). Secure spectrum leasing in cognitive radio networks via secure primary–secondary user interaction. In Advances in Intelligent Systems and Computing (Vol. 394, pp. 735–741). Springer Verlag. https://doi.org/10.1007/978-81-322-2656-7_67

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free