Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks
In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for Cognitive Radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow’s XMesh using MoteWorks software platform. The main goal of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analyzed, along with the challenges faced. We shall discuss in detail how the proposed immunity and adaptability model can mitigate security threats faced by CR and carry out research on a range of selected techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.
KeywordsCognitive Radio Primary User Secondary User Cognitive Radio Network Security Threat
Unable to display preview. Download preview PDF.
- 2.Chaczko, Z.: Towards epistemic autonomy in adaptive biomimetic middleware for cooperative sensornets. Ph.D. thesis, University of Technology Sydney (2009)Google Scholar
- 3.Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (2008)Google Scholar
- 4.Dasgupta, D.: Immunity-based intrusion detection system: A general framework. In: Proceedings of the 22th International Information System Security Conference (1999)Google Scholar
- 6.ICT Regulation Toolkit: What is spectrum trading. Tech. rep., (2010), http://www.ictregulationtoolkit.org
- 7.Jaroń, J.: Systemic prolegomena to theoretical cybernetics. In: Scientific Papers of Institute of Technical Cybernetics, vol. (45). Wroclaw University of Technology (1978)Google Scholar
- 8.Jungwon, K., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the Congress on Evolutionary Computation (2001)Google Scholar
- 10.Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.A.: Cooperative ais framework for intrusion detection. In: Proceedings of the IEEE International Conference on Communications ICC 2007 (2007)Google Scholar
- 11.Mitola, J.: Cognitive radio: An integrated agent architecture for software defined radio. Ph.D. thesis, KTH Royal Institute of Technology (2000)Google Scholar
- 12.Nikodem, J.: Autonomy and cooperation as factors of dependability in wireless sensor network. In: Proceedings of the Conference in Dependability of Computer Systems (2008)Google Scholar
- 13.Timmis, J.I.: Artificial immune systems: A novel data analysis technique inspired by the immune network theory. Ph.D. thesis, University of Kent (2000)Google Scholar
- 14.Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. Tech. rep., Department of Computer Science and Technology. Jilin University, China (2008)Google Scholar