Abstract
This paper discusses the introduction of anthropology and sociology-inspired approaches to providing security in collaborative self-aware cognitive radio networks. This includes the introduction of not only trust models, but also respect models and ‘intuition’ models. This paper discusses numerous potential benefits from this type of approach, including benefits to algorithm security, compromise recovery, protection from the Byzantine threat, and policy enforcement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The XG Vision, Request for Comments, Version 2.0, XG Working Group, http://www.darpa.mil/ato/programs/XG/rfcs.htm
The XG Architectural Framework, Request for Comments, Version 2.0, XG Working Group, http://www.darpa.mil/ato/programs/XG/rfcs.htm
Cordeiro, C., et al.: IEEE 802.22: The First Worldwide Wireless Standard based on Cognitive Radios. In: 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), November 8-11, pp. 328–337 (2005)
Goldsmith, A.J., Wicker, S.B.: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks. IEEE Wireless Communications Magazine (August 2002)
Burbank, J.L.: Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security. In: Proceedings of the Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), May 15-17 (2008)
Burbank, J.L., Roger Hammons Jr., A., Jones, S.D.: A Common Lexicon and Design Issues Surrounding Cognitive Radio Networks Operating in the Presence of Jamming. Accepted for presentation at the 2008 IEEE Military Communications (MILCOM) Conference (November 2008)
Cesa-Bianchi, N., et al.: How to use Expert Advice. Journal of the ACM (May 1997)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), September 28 (2002)
Reggia, J.A., Sutton III, G.G.: Self-processing networks and their biomedical implications. Proceedings of the IEEE (June 1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Burbank, J.L., Kasch, W.T.M. (2009). The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-03354-4_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03353-7
Online ISBN: 978-3-642-03354-4
eBook Packages: Computer ScienceComputer Science (R0)