Security threats in military cognitive radio networks

Feten Slimeni, Bart Scheers, Zied Chtourou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The emergence of new wireless services and the growing demand for wireless communications are creating a spectrum shortage problem. Moreover, the current technique of static frequency allocation leads to inefficiency utilization of the available spectrum. Cognitive radio (CR) and dynamic spectrum management (DSM) concepts, aim to solve this imbalance between scarcity and under utilization of the spectrum by dynamically using the free frequency bands. However, this technology introduces new vulnerabilities and opportunities for malicious users compared to traditional wireless networks due to its intrinsic characteristics. In this paper, we present a comprehensive review of common CR attacks and their potential countermeasures with projection on military radio networks. We classify the attacks based on the four main functions of the cognitive radio, not according to the layers of the OSI model as usually done. Through this classification, we tried to provide directions for related researches to discern which cognitive functionality has to be insured against each threat.

Original languageEnglish
Title of host publication2015 International Conference on Military Communications and Information Systems, ICMCIS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9788393484812
DOIs
Publication statusPublished - 14 Jul 2015
Event2015 International Conference on Military Communications and Information Systems, ICMCIS 2015 - Cracow, Poland
Duration: 18 May 201519 May 2015

Publication series

Name2015 International Conference on Military Communications and Information Systems, ICMCIS 2015

Conference

Conference2015 International Conference on Military Communications and Information Systems, ICMCIS 2015
Country/TerritoryPoland
CityCracow
Period18/05/1519/05/15

Fingerprint

Dive into the research topics of 'Security threats in military cognitive radio networks'. Together they form a unique fingerprint.

Cite this