Scheduled System Maintenance:
On May 6th, system maintenance will take place from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). During this time, there may be intermittent impact on performance. We apologize for the inconvenience.
By Topic

Design of a secure software download algorithm in software defined radio terminals using quantum cryptography

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Mahimkar, A. ; Dept. of Inf. Technol., Univ. of Mumbai, India

A software defined radio (SDR) terminal may be regarded as a programmable radio transceiver whereby the user equipment is able to reconfigure itself, in terms of its capability, functionality and behavior, in order to accommodate the needs of the user dynamically. The terminal must be able to switch from one mode to another if the quality of the incumbent mode becomes unacceptable or a new mode is preferred. The mode switch may involve downloading appropriate software. When the SDR terminal decides to switch to a different mode, it triggers a software download process. The reconfiguration agent submits the software of the new mode and its hardware to the authorities for testing. Once the combination of software and hardware has been approved, the hash is assigned using the approval authority's secret key. The software along with the digital signature is encrypted using the secret key of the terminal which requested the software download. The encrypted data is sent to the terminal, which decrypts it using the secret key and gets the software for the appropriate mode and verifies the digital signature of the authority. The paper describes a novel technique, using quantum cryptography, for secret key distribution between the reconfiguration agent and the terminal.

Published in:

Mobile and Wireless Communications Network, 2002. 4th International Workshop on

Date of Conference:

2002