Combating Security Threats via Immunity and Adaptability in Cognitive Radio Networks

نویسندگان

  • Jan Nikodem
  • Zenon Chaczko
  • Maciej Nikodem
  • Ryszard Klempous
  • Ruckshan Wickramasooriya
چکیده

In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for cognitive radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow’s XMesh using MoteWorks software platform. The aim of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analysed, along with the challenges faced. We shall discuss in detail how our immunity and adaptability model can mitigate security threats faced by CR and carry out selected research on techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

An Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks

While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article, we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of ...

متن کامل

Spectrum Sharing Security and Attacks in CRNs: a Review

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive r...

متن کامل

Secure Sensing in Cognitive Radio Networks using Emitters Electromagnetic Signature

As Cognitive Radio Networks (CRN) gain in popularity as an extremely promising wireless technology that can alleviate the apparent spectrum scarcity and support innovative wireless applications; they will become bigger targets for hackers. Moreover, they will also be exposed to diverse security threats especially at the PHY-layer spectrum sensing module. Hence, security consideration is central...

متن کامل

Simulation framework for security threats in cognitive radio networks

Along with Cognitive Radio Networks are been developed, to design optimistic security mechanisms is becoming a big challenge. This paper proposes a taxonomy of attacks on Cognitive Radio Networks. This will help researches in the area to better understand the security problems and design more optimistic countermeasures. A new simulation framework for security threats has been developed to check...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012