3rd International ICST Workshop on Trusted Collaboration

Research Article

The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks

Download
448 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-03354-4_36,
        author={Jack Burbank and William Kasch},
        title={The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks},
        proceedings={3rd International ICST Workshop on Trusted Collaboration},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={5},
        keywords={Trust model respect models collaborative networking cognitive networking},
        doi={10.1007/978-3-642-03354-4_36}
    }
    
  • Jack Burbank
    William Kasch
    Year: 2012
    The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks
    TRUSTCOL
    Springer
    DOI: 10.1007/978-3-642-03354-4_36
Jack Burbank1,*, William Kasch1,*
  • 1: The Johns Hopkins University Applied Physics Laboratory
*Contact email: Jack.Burbank@jhuapl.edu, William.Kasch@jhuapl.edu

Abstract

This paper discusses the introduction of anthropology and sociology-inspired approaches to providing security in collaborative self-aware cognitive radio networks. This includes the introduction of not only trust models, but also respect models and ‘intuition’ models. This paper discusses numerous potential benefits from this type of approach, including benefits to algorithm security, compromise recovery, protection from the Byzantine threat, and policy enforcement.