Primary User Authentication in Cognitive Radio Network Using pre-generated hash digest.
Muzzammil HussainTulsi SwamiPublished in: ICACCI (2018)
Keyphrases
- cognitive radio
- user authentication
- cognitive radio networks
- spectrum sensing
- wireless communication
- wireless networks
- communication systems
- base station
- key technologies
- security analysis
- computer networks
- peer to peer
- communication networks
- hash functions
- wireless sensor networks
- authentication protocol
- information security
- wireless mesh networks
- computer simulation