Combating Security Threats via Immunity and Adapatbility in Cognitive Radio Networks

Publisher:
Springer-Verlag
Publication Type:
Chapter
Citation:
Recent Advances in Intelligent Engineering Systems, 2012, Studies In Computational Intelligence, Volume 378, pp. 221 - 242
Issue Date:
2012-01
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2011001752OK.pdf701.25 kB
Adobe PDF
In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for cognitive radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow's XMesh using MoteWorks software platform. The aim of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/ adaptability functions, their benefits and applications in CR are analysed, along with the challenges faced. We shall discuss in detail how our immunity and adaptability model can mitigate security threats faced by CR and carry out selected research on techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.
Please use this identifier to cite or link to this item: