TY - GEN
T1 - Security threats in military cognitive radio networks
AU - Slimeni, Feten
AU - Scheers, Bart
AU - Chtourou, Zied
N1 - Publisher Copyright:
© 2015 Military University of Technology.
PY - 2015/7/14
Y1 - 2015/7/14
N2 - The emergence of new wireless services and the growing demand for wireless communications are creating a spectrum shortage problem. Moreover, the current technique of static frequency allocation leads to inefficiency utilization of the available spectrum. Cognitive radio (CR) and dynamic spectrum management (DSM) concepts, aim to solve this imbalance between scarcity and under utilization of the spectrum by dynamically using the free frequency bands. However, this technology introduces new vulnerabilities and opportunities for malicious users compared to traditional wireless networks due to its intrinsic characteristics. In this paper, we present a comprehensive review of common CR attacks and their potential countermeasures with projection on military radio networks. We classify the attacks based on the four main functions of the cognitive radio, not according to the layers of the OSI model as usually done. Through this classification, we tried to provide directions for related researches to discern which cognitive functionality has to be insured against each threat.
AB - The emergence of new wireless services and the growing demand for wireless communications are creating a spectrum shortage problem. Moreover, the current technique of static frequency allocation leads to inefficiency utilization of the available spectrum. Cognitive radio (CR) and dynamic spectrum management (DSM) concepts, aim to solve this imbalance between scarcity and under utilization of the spectrum by dynamically using the free frequency bands. However, this technology introduces new vulnerabilities and opportunities for malicious users compared to traditional wireless networks due to its intrinsic characteristics. In this paper, we present a comprehensive review of common CR attacks and their potential countermeasures with projection on military radio networks. We classify the attacks based on the four main functions of the cognitive radio, not according to the layers of the OSI model as usually done. Through this classification, we tried to provide directions for related researches to discern which cognitive functionality has to be insured against each threat.
UR - http://www.scopus.com/inward/record.url?scp=84943303282&partnerID=8YFLogxK
U2 - 10.1109/ICMCIS.2015.7158714
DO - 10.1109/ICMCIS.2015.7158714
M3 - Conference contribution
AN - SCOPUS:84943303282
T3 - 2015 International Conference on Military Communications and Information Systems, ICMCIS 2015
BT - 2015 International Conference on Military Communications and Information Systems, ICMCIS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2015 International Conference on Military Communications and Information Systems, ICMCIS 2015
Y2 - 18 May 2015 through 19 May 2015
ER -