On security vulnerabilities and mitigation in the cognition cycle of distributed Cognitive Radio Networks

Yau, K.-L., Komisarczuk, Peter, Poh, Geong Sen and Martin, K. (2011) On security vulnerabilities and mitigation in the cognition cycle of distributed Cognitive Radio Networks. In: 6th International Conference on Broadband Communications and Biomedical Applications (IB2COM) IEEE, 21-24 November 2011, Melbourne, Australia.

Full text not available from this repository.


Cognitive Radio (CR) enables unlicensed or
Secondary Users (SUs) to operate in underutilized spectrum
(or white spaces) owned by licensed or Primary Users (PUs)
conditional upon PU encountering acceptable interference
levels. A Distributed Cognitive Radio Network (DCRN) is a
distributed wireless network established by a number of SUs in
the absence of fixed network infrastructure such as a base
station. Cognition Cycle (CC) is the key concept of CR to
provide intelligence to SUs so that they are able to sense for
white spaces and carry out an optimal or near-optimal joint
action on its operating environment for network-wide
performance enhancement. The CC can be applied in various
applications in DCRNs such as dynamic channel selection,
topology management, congestion control, and scheduling.
Popular artificial intelligence approaches such as
Reinforcement Learning (RL) have been widely applied to
realize the conceptual CC. As with other computer networks,
there are security aspects in DCRN but the research into them
is still in its infancy. To the best of our knowledge, no attempt
has been made to date to investigate security vulnerabilities in
DCRN as a result of the application of RL. This paper aims to
spark new research interest in this area. We provide our initial
investigation on security vulnerabilities, as well as their
mitigation, in RL-based applications in DCRNs.

Item Type: Conference or Workshop Item (Paper)
Subjects: Computing
Depositing User: Vani Aul
Date Deposited: 21 Mar 2014 15:11
Last Modified: 22 Feb 2017 10:43
URI: http://repository.uwl.ac.uk/id/eprint/771

Actions (login required)

View Item View Item