Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective
by Kok-Lim Alvin Yau; Geong Sen Poh; Peter Komisarczuk
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 12, No. 3, 2013

Abstract: Cognitive Radio (CR) enables Secondary Users (SUs) to observe, learn and take the right action on its operating environment at any time instant. This feature has inevitably exposed the SUs to artificial intelligence attacks from adversaries. This paper provides a survey on various kinds of attacks, as well as reviews and proposes mitigation approaches to tackle them from a multi-agent perspective. Additionally, this paper shows the impact and criticality of artificial intelligence attacks on network-wide performance. We aim to establish a foundation, and to spark new research interests in this new and critical area.

Online publication date: Sat, 02-Mar-2013

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com