Skip to main content

Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 378))

Abstract

In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for Cognitive Radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow’s XMesh using MoteWorks software platform. The main goal of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analyzed, along with the challenges faced. We shall discuss in detail how the proposed immunity and adaptability model can mitigate security threats faced by CR and carry out research on a range of selected techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A new computational intelligence approach. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  2. Chaczko, Z.: Towards epistemic autonomy in adaptive biomimetic middleware for cooperative sensornets. Ph.D. thesis, University of Technology Sydney (2009)

    Google Scholar 

  3. Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (2008)

    Google Scholar 

  4. Dasgupta, D.: Immunity-based intrusion detection system: A general framework. In: Proceedings of the 22th International Information System Security Conference (1999)

    Google Scholar 

  5. Hofmeyr, S.: Architecture for an artificial immune system. Evolutionary Computation 8(3), 443–473 (2000)

    Article  Google Scholar 

  6. ICT Regulation Toolkit: What is spectrum trading. Tech. rep., (2010), http://www.ictregulationtoolkit.org

  7. Jaroń, J.: Systemic prolegomena to theoretical cybernetics. In: Scientific Papers of Institute of Technical Cybernetics, vol. (45). Wroclaw University of Technology (1978)

    Google Scholar 

  8. Jungwon, K., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the Congress on Evolutionary Computation (2001)

    Google Scholar 

  9. Kohonen, T.: Self Organizing Maps. Springer, Heidelberg (2001)

    Book  MATH  Google Scholar 

  10. Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.A.: Cooperative ais framework for intrusion detection. In: Proceedings of the IEEE International Conference on Communications ICC 2007 (2007)

    Google Scholar 

  11. Mitola, J.: Cognitive radio: An integrated agent architecture for software defined radio. Ph.D. thesis, KTH Royal Institute of Technology (2000)

    Google Scholar 

  12. Nikodem, J.: Autonomy and cooperation as factors of dependability in wireless sensor network. In: Proceedings of the Conference in Dependability of Computer Systems (2008)

    Google Scholar 

  13. Timmis, J.I.: Artificial immune systems: A novel data analysis technique inspired by the immune network theory. Ph.D. thesis, University of Kent (2000)

    Google Scholar 

  14. Zhang, Y., Xu, G., Geng, X.: Security threats in cognitive radio networks. Tech. rep., Department of Computer Science and Technology. Jilin University, China (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Nikodem, J., Chaczko, Z., Nikodem, M., Klempous, R., Wickramasooriya, R. (2012). Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks. In: Fodor, J., Klempous, R., Suárez Araujo, C.P. (eds) Recent Advances in Intelligent Engineering Systems. Studies in Computational Intelligence, vol 378. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23229-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23229-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23228-2

  • Online ISBN: 978-3-642-23229-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics