Advertisement

Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks

  • Jan Nikodem
  • Zenon Chaczko
  • Maciej Nikodem
  • Ryszard Klempous
  • Ruckshan Wickramasooriya
Part of the Studies in Computational Intelligence book series (SCI, volume 378)

Abstract

In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for Cognitive Radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow’s XMesh using MoteWorks software platform. The main goal of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analyzed, along with the challenges faced. We shall discuss in detail how the proposed immunity and adaptability model can mitigate security threats faced by CR and carry out research on a range of selected techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.

Keywords

Cognitive Radio Primary User Secondary User Cognitive Radio Network Security Threat 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    de Castro, L.N., Timmis, J.: Artificial Immune Systems: A new computational intelligence approach. Springer, Heidelberg (2002)zbMATHGoogle Scholar
  2. 2.
    Chaczko, Z.: Towards epistemic autonomy in adaptive biomimetic middleware for cooperative sensornets. Ph.D. thesis, University of Technology Sydney (2009)Google Scholar
  3. 3.
    Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (2008)Google Scholar
  4. 4.
    Dasgupta, D.: Immunity-based intrusion detection system: A general framework. In: Proceedings of the 22th International Information System Security Conference (1999)Google Scholar
  5. 5.
    Hofmeyr, S.: Architecture for an artificial immune system. Evolutionary Computation 8(3), 443–473 (2000)CrossRefGoogle Scholar
  6. 6.
    ICT Regulation Toolkit: What is spectrum trading. Tech. rep., (2010), http://www.ictregulationtoolkit.org
  7. 7.
    Jaroń, J.: Systemic prolegomena to theoretical cybernetics. In: Scientific Papers of Institute of Technical Cybernetics, vol. (45). Wroclaw University of Technology (1978)Google Scholar
  8. 8.
    Jungwon, K., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the Congress on Evolutionary Computation (2001)Google Scholar
  9. 9.
    Kohonen, T.: Self Organizing Maps. Springer, Heidelberg (2001)zbMATHCrossRefGoogle Scholar
  10. 10.
    Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.A.: Cooperative ais framework for intrusion detection. In: Proceedings of the IEEE International Conference on Communications ICC 2007 (2007)Google Scholar
  11. 11.
    Mitola, J.: Cognitive radio: An integrated agent architecture for software defined radio. Ph.D. thesis, KTH Royal Institute of Technology (2000)Google Scholar
  12. 12.
    Nikodem, J.: Autonomy and cooperation as factors of dependability in wireless sensor network. In: Proceedings of the Conference in Dependability of Computer Systems (2008)Google Scholar
  13. 13.
    Timmis, J.I.: Artificial immune systems: A novel data analysis technique inspired by the immune network theory. Ph.D. thesis, University of Kent (2000)Google Scholar
  14. 14.
    Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. Tech. rep., Department of Computer Science and Technology. Jilin University, China (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jan Nikodem
    • 1
  • Zenon Chaczko
    • 2
  • Maciej Nikodem
    • 1
  • Ryszard Klempous
    • 1
  • Ruckshan Wickramasooriya
    • 2
  1. 1.Institute of Computer Engineering, Control and RoboticsWroclaw University of TechnologyWrocławPoland
  2. 2.Faculty of Engineering and ITUniversity of Technology Sydney (UTS)UltimoAustralia

Personalised recommendations