Z. Chaczko, Ruckshan Wickramasooriya, R. Klempous, J. Nikodem
{"title":"Security threats in Cognitive Radio applications","authors":"Z. Chaczko, Ruckshan Wickramasooriya, R. Klempous, J. Nikodem","doi":"10.1109/INES.2010.5483845","DOIUrl":null,"url":null,"abstract":"In this paper we shall consider security aspects of Cognitive Radio (CR) and its applications. We shall cover design of a security simulation model for cognitive radio and discuss results of conducted experiments using Omnet++ simulation tool in the . Net environment. The aim of this paper is to provide an overview of various applications of CR as well as the security threats faced when applying this technology. The functions, benefits and applications of CR are analyzed, along with the challenges faced by the technology. We shall discuss in detail a several security threats faced by CR and carry out selected research on techniques used to mitigate such malicious attacks and provide examples of simulation experiments in Omnet++.","PeriodicalId":118326,"journal":{"name":"2010 IEEE 14th International Conference on Intelligent Engineering Systems","volume":"142 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 14th International Conference on Intelligent Engineering Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INES.2010.5483845","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
In this paper we shall consider security aspects of Cognitive Radio (CR) and its applications. We shall cover design of a security simulation model for cognitive radio and discuss results of conducted experiments using Omnet++ simulation tool in the . Net environment. The aim of this paper is to provide an overview of various applications of CR as well as the security threats faced when applying this technology. The functions, benefits and applications of CR are analyzed, along with the challenges faced by the technology. We shall discuss in detail a several security threats faced by CR and carry out selected research on techniques used to mitigate such malicious attacks and provide examples of simulation experiments in Omnet++.