Skip to main content

The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks

  • Conference paper
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

This paper discusses the introduction of anthropology and sociology-inspired approaches to providing security in collaborative self-aware cognitive radio networks. This includes the introduction of not only trust models, but also respect models and ‘intuition’ models. This paper discusses numerous potential benefits from this type of approach, including benefits to algorithm security, compromise recovery, protection from the Byzantine threat, and policy enforcement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The XG Vision, Request for Comments, Version 2.0, XG Working Group, http://www.darpa.mil/ato/programs/XG/rfcs.htm

  2. The XG Architectural Framework, Request for Comments, Version 2.0, XG Working Group, http://www.darpa.mil/ato/programs/XG/rfcs.htm

  3. Cordeiro, C., et al.: IEEE 802.22: The First Worldwide Wireless Standard based on Cognitive Radios. In: 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), November 8-11, pp. 328–337 (2005)

    Google Scholar 

  4. Goldsmith, A.J., Wicker, S.B.: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks. IEEE Wireless Communications Magazine (August 2002)

    Google Scholar 

  5. Burbank, J.L.: Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security. In: Proceedings of the Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), May 15-17 (2008)

    Google Scholar 

  6. Burbank, J.L., Roger Hammons Jr., A., Jones, S.D.: A Common Lexicon and Design Issues Surrounding Cognitive Radio Networks Operating in the Presence of Jamming. Accepted for presentation at the 2008 IEEE Military Communications (MILCOM) Conference (November 2008)

    Google Scholar 

  7. Cesa-Bianchi, N., et al.: How to use Expert Advice. Journal of the ACM (May 1997)

    Google Scholar 

  8. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), September 28 (2002)

    Google Scholar 

  9. Reggia, J.A., Sutton III, G.G.: Self-processing networks and their biomedical implications. Proceedings of the IEEE (June 1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Burbank, J.L., Kasch, W.T.M. (2009). The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics