Cognitive Security of Wireless Communication Systems in the Physical Layer
Table 1
Advantages of cognitive security concept against security threats.
Security threats
Explanation of cognitive security conditions
Benefits
Eavesdropping
(i) Increase the secrecy rate (versus information rate) in scenarios of high user dense areas such as office blocks and airports or locations such as urban areas or specific applications such as military and public safety
Data rate Latency Energy consumption
(ii) Relax the secrecy constraints, that is, increase the information rate, for conditions such as rural areas, WiFi, and cellular communication
Jamming
The level of security against jamming, for example, processing gain in spread spectrum, is adaptively increased in locations such as intersections of roads or specific applications such as military and public safety
Reliability Complexity Latency
Spoofing
Enable the spoofing detection mechanism when the condition exists, and disable the algorithm, or use a simpler method, in high user dense areas such as office blocks, stadiums, or locations such as intersections of roads and location dependent UAV devices, or specific applications such as military and in vivo communication