On security vulnerabilities and mitigation in the cognition cycle of distributed Cognitive Radio Networks

Yau, K.-L., Komisarczuk, Peter, Poh, Geong Sen and Martin, Keith M. (2011) On security vulnerabilities and mitigation in the cognition cycle of distributed Cognitive Radio Networks. In: 6th International Conference on Broadband Communications and Biomedical Applications (IB2COM) IEEE, 21-24 Nov 2011, Melbourne, Australia.

Full text not available from this repository.

Abstract

Cognitive Radio (CR) enables unlicensed or Secondary Users (SUs) to operate in underutilized spectrum (or white spaces) owned by licensed or Primary Users (PUs) conditional upon PU encountering acceptable interference levels. A Distributed Cognitive Radio Network (DCRN) is a distributed wireless network established by a number of SUs in the absence of fixed network infrastructure such as a base station. Cognition Cycle (CC) is the key concept of CR to provide intelligence to SUs so that they are able to sense for white spaces and carry out an optimal or near-optimal joint action on its operating environment for network-wide performance enhancement. The CC can be applied in various applications in DCRNs such as dynamic channel selection, topology management, congestion control, and scheduling. Popular artificial intelligence approaches such as Reinforcement Learning (RL) have been widely applied to realize the conceptual CC. As with other computer networks, there are security aspects in DCRN but the research into them is still in its infancy. To the best of our knowledge, no attempt has been made to date to investigate security vulnerabilities in DCRN as a result of the application of RL. This paper aims to spark new research interest in this area. We provide our initial investigation on security vulnerabilities, as well as their mitigation, in RL-based applications in DCRNs.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9781467307680
Identifier: 10.1109/IB2Com.2011.6217907
Page Range: pp. 132-137
Uncontrolled Keywords: Cognitive radio, Cognition, Cryptography, Learning, Joints, Authentication
Subjects: Computing
Depositing User: Vani Aul
Date Deposited: 21 Mar 2014 15:11
Last Modified: 01 Aug 2017 08:12
URI: http://repository.uwl.ac.uk/id/eprint/771

Actions (login required)

View Item View Item

Menu