Abstract
In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for Cognitive Radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow’s XMesh using MoteWorks software platform. The main goal of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analyzed, along with the challenges faced. We shall discuss in detail how the proposed immunity and adaptability model can mitigate security threats faced by CR and carry out research on a range of selected techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
de Castro, L.N., Timmis, J.: Artificial Immune Systems: A new computational intelligence approach. Springer, Heidelberg (2002)
Chaczko, Z.: Towards epistemic autonomy in adaptive biomimetic middleware for cooperative sensornets. Ph.D. thesis, University of Technology Sydney (2009)
Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (2008)
Dasgupta, D.: Immunity-based intrusion detection system: A general framework. In: Proceedings of the 22th International Information System Security Conference (1999)
Hofmeyr, S.: Architecture for an artificial immune system. Evolutionary Computation 8(3), 443–473 (2000)
ICT Regulation Toolkit: What is spectrum trading. Tech. rep., (2010), http://www.ictregulationtoolkit.org
Jaroń, J.: Systemic prolegomena to theoretical cybernetics. In: Scientific Papers of Institute of Technical Cybernetics, vol. (45). Wroclaw University of Technology (1978)
Jungwon, K., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the Congress on Evolutionary Computation (2001)
Kohonen, T.: Self Organizing Maps. Springer, Heidelberg (2001)
Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.A.: Cooperative ais framework for intrusion detection. In: Proceedings of the IEEE International Conference on Communications ICC 2007 (2007)
Mitola, J.: Cognitive radio: An integrated agent architecture for software defined radio. Ph.D. thesis, KTH Royal Institute of Technology (2000)
Nikodem, J.: Autonomy and cooperation as factors of dependability in wireless sensor network. In: Proceedings of the Conference in Dependability of Computer Systems (2008)
Timmis, J.I.: Artificial immune systems: A novel data analysis technique inspired by the immune network theory. Ph.D. thesis, University of Kent (2000)
Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. Tech. rep., Department of Computer Science and Technology. Jilin University, China (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Nikodem, J., Chaczko, Z., Nikodem, M., Klempous, R., Wickramasooriya, R. (2012). Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks. In: Fodor, J., Klempous, R., Suárez Araujo, C.P. (eds) Recent Advances in Intelligent Engineering Systems. Studies in Computational Intelligence, vol 378. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23229-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-23229-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23228-2
Online ISBN: 978-3-642-23229-9
eBook Packages: EngineeringEngineering (R0)