Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio

Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio

Andre Abadie, Damindra Bandara, Duminda Wijesekera
ISBN13: 9781466665712|ISBN10: 1466665718|EISBN13: 9781466665729
DOI: 10.4018/978-1-4666-6571-2.ch030
Cite Chapter Cite Chapter

MLA

Abadie, Andre, et al. "Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio." Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, edited by Naima Kaabouch and Wen-Chen Hu, IGI Global, 2015, pp. 792-812. https://doi.org/10.4018/978-1-4666-6571-2.ch030

APA

Abadie, A., Bandara, D., & Wijesekera, D. (2015). Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio. In N. Kaabouch & W. Hu (Eds.), Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management (pp. 792-812). IGI Global. https://doi.org/10.4018/978-1-4666-6571-2.ch030

Chicago

Abadie, Andre, Damindra Bandara, and Duminda Wijesekera. "Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio." In Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management, edited by Naima Kaabouch and Wen-Chen Hu, 792-812. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6571-2.ch030

Export Reference

Mendeley
Favorite

Abstract

Even though security research in cognitive radio offers specific countermeasures to address known threats, there are a number of unknown conditions or influences that will shape its eventual realization once it reaches capability maturity. To attempt to secure against such unknowns, this chapter describes a risk engine that can incorporate a risk assessment cognition cycle. In various business sectors, risk management is the preferred mechanism to address unknown conditions and therefore offers promise in this context. The chapter describes how the risk engine can potentially address the vulnerabilities inherent to radio operation: in the sensing/perception of spectrum, in the cognition cycle, or in the device infrastructure. It highlights some well-defined threats, their associated countermeasures, and suggests conceptual approaches for a risk engine to intervene in those scenarios. Finally, a case study is introduced to demonstrate an example risk engine's ability to accurately assess particular risks in a given operational environment as well as potentially detect adversarial actions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.