Combating security threats via immunity and adaptability in cognitive radio networks

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for Cognitive Radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow's XMesh using MoteWorks software platform. The main goal of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/adaptability functions, their benefits and applications in CR are analyzed, along with the challenges faced. We shall discuss in detail how the proposed immunity and adaptability model can mitigate security threats faced by CR and carry out research on a range of selected techniques that can help to mitigate malicious attacks and provide examples of simulation experiments. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Nikodem, J., Chaczko, Z., Nikodem, M., Klempous, R., & Wickramasooriya, R. (2012). Combating security threats via immunity and adaptability in cognitive radio networks. In Studies in Computational Intelligence (Vol. 378, pp. 221–242). https://doi.org/10.1007/978-3-642-23229-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free