Skip to main content
Erschienen in: Mobile Networks and Applications 5/2008

01.10.2008

Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment

verfasst von: Timothy X Brown, Amita Sethi

Erschienen in: Mobile Networks and Applications | Ausgabe 5/2008

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio development.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
But, an attacker that is close enough or has a powerful enough transmitter can always detect or attack a spread spectrum signal.
 
2
Of course, a part of the policy is its geographic application area and other requirements so that inappropriate policies would not be arbitrarily applied.
 
Literatur
1.
Zurück zum Zitat Akyildiz IF, Lee WY, Vuran MC, Mohanty S (2006) NeXt generation dynamic spectrum access cognitive radio wireless networks: a survey. Comput Networks 50:2127–2159MATHCrossRef Akyildiz IF, Lee WY, Vuran MC, Mohanty S (2006) NeXt generation dynamic spectrum access cognitive radio wireless networks: a survey. Comput Networks 50:2127–2159MATHCrossRef
2.
Zurück zum Zitat Barbeau M (2005) WiMax/802.16 threat analysis. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, Quebec, Canada Barbeau M (2005) WiMax/802.16 threat analysis. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, Quebec, Canada
3.
Zurück zum Zitat Brown TX (2005) An analysis of licensed channel avoidance strategies for unlicensed devices. In: Proceedings of IEEE DySPAN, Nov. 8–11 Brown TX (2005) An analysis of licensed channel avoidance strategies for unlicensed devices. In: Proceedings of IEEE DySPAN, Nov. 8–11
4.
Zurück zum Zitat Brown TX, James JE, Sethi A (2006) Jamming and sensing of encrypted wireless ad hoc networks. In: Proceedings of the seventh ACM international symposium on mobile ad hoc networking and computing (MobiHoc), Florence, 22–25 May Brown TX, James JE, Sethi A (2006) Jamming and sensing of encrypted wireless ad hoc networks. In: Proceedings of the seventh ACM international symposium on mobile ad hoc networking and computing (MobiHoc), Florence, 22–25 May
5.
Zurück zum Zitat Brown TX, Sethi A (2007) Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies 2007 (ISART 2007), Boulder, 26–28 Feb Brown TX, Sethi A (2007) Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies 2007 (ISART 2007), Boulder, 26–28 Feb
6.
Zurück zum Zitat Brown TX, Sethi A (2007) Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment. In: Proceedings of the second international conference on cognitive radio oriented wireless networks and communications 2007 (CrownCom 2007), Orlando, 31 July–3 Aug Brown TX, Sethi A (2007) Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment. In: Proceedings of the second international conference on cognitive radio oriented wireless networks and communications 2007 (CrownCom 2007), Orlando, 31 July–3 Aug
7.
Zurück zum Zitat Brown TX, Sicker D (2007) Can cognitive radio support broadband wireless access? In: Proceedings of the IEEE DySPAN, April 17–20 Brown TX, Sicker D (2007) Can cognitive radio support broadband wireless access? In: Proceedings of the IEEE DySPAN, April 17–20
8.
Zurück zum Zitat Chapin JM, Lehr WH (2007) Time-limited leases for innovative radios. In Proceedings of the IEEE DySPAN, April 17–20 Chapin JM, Lehr WH (2007) Time-limited leases for innovative radios. In Proceedings of the IEEE DySPAN, April 17–20
9.
Zurück zum Zitat DARPA XG Working Group (2003) “The XG vision,” Request for comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July DARPA XG Working Group (2003) “The XG vision,” Request for comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July
10.
Zurück zum Zitat DARPA XG Working Group (2003) “The XG architectural framework,” Request for comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July DARPA XG Working Group (2003) “The XG architectural framework,” Request for comments, version 1.0, Prepared by BBN Technologies, Cambridge, Mass., USA. July
11.
Zurück zum Zitat End-to-End Reconfigurability (E2R) Phase II website (e2r2.motlabs.com) End-to-End Reconfigurability (E2R) Phase II website (e2r2.motlabs.com)
12.
Zurück zum Zitat ETSI (2003) Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; part I: threat analysis. Technical specification ETSI TS 102 165-1 V4.1.1 ETSI (2003) Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; part I: threat analysis. Technical specification ETSI TS 102 165-1 V4.1.1
15.
Zurück zum Zitat FCC ET Docket No. 04-186, “Unlicensed operation in the TV broadcast bands,” ET Docket No. 02-380, “Additional spectrum for unlicensed devices below 900 mhz and in the 3 ghz band,” FCC report and order and further notice of proposed rulemaking, adopted on October12, 2006 FCC ET Docket No. 04-186, “Unlicensed operation in the TV broadcast bands,” ET Docket No. 02-380, “Additional spectrum for unlicensed devices below 900 mhz and in the 3 ghz band,” FCC report and order and further notice of proposed rulemaking, adopted on October12, 2006
16.
Zurück zum Zitat Heusse M, Rousseau F, Berger-Sabbatel G, Duda A (2003) Performance anomaly of 802.11b. In: Proceedings of the INFOCOM 2003, v. 2, 30 Mar.–3 Apr. 2003, pp 836–843 Heusse M, Rousseau F, Berger-Sabbatel G, Duda A (2003) Performance anomaly of 802.11b. In: Proceedings of the INFOCOM 2003, v. 2, 30 Mar.–3 Apr. 2003, pp 836–843
17.
Zurück zum Zitat Householder A, Manion A, Pesante L, Weaver GM (2001) Managing the threat of denial-of-service attacks. CERT Coordination Center, v10.0, October Householder A, Manion A, Pesante L, Weaver GM (2001) Managing the threat of denial-of-service attacks. CERT Coordination Center, v10.0, October
18.
Zurück zum Zitat Hubaux J, Buttyán L, Čapkun S (2001) The quest for security in mobile ad hoc networks. In: Proceedings of the ACM symposium on mobile ad hoc networking and computing (MobiHOC), New York, NY Hubaux J, Buttyán L, Čapkun S (2001) The quest for security in mobile ad hoc networks. In: Proceedings of the ACM symposium on mobile ad hoc networking and computing (MobiHOC), New York, NY
20.
Zurück zum Zitat Ma L, Han X, Shen C-C (2005) Dynamic open spectrum sharing MAC protocol for wireless ad hoc network. In: Proceedings of the IEEE DySpan, Nov. 8–11, pp 203–213 Ma L, Han X, Shen C-C (2005) Dynamic open spectrum sharing MAC protocol for wireless ad hoc network. In: Proceedings of the IEEE DySpan, Nov. 8–11, pp 203–213
21.
Zurück zum Zitat Mathur CN, Subbalakshmi KP (2007) Security issues in cognitive radio networks. In: Cognitive networks: towards self-aware networks, July Mathur CN, Subbalakshmi KP (2007) Security issues in cognitive radio networks. In: Cognitive networks: towards self-aware networks, July
22.
Zurück zum Zitat Menon R, Buehrer RM, Reed JH (2005) Outage probability based comparison of underlay and overlay spectrum sharing techniques. In: Proceedings of the IEEE DySpan, Nov. 8–11, pp 101–109 Menon R, Buehrer RM, Reed JH (2005) Outage probability based comparison of underlay and overlay spectrum sharing techniques. In: Proceedings of the IEEE DySpan, Nov. 8–11, pp 101–109
23.
Zurück zum Zitat Newsome J, Shi E, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of third international symposium on information processing in sensor networks, IPSN, 26–27 Apr., pp 259–268 Newsome J, Shi E, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of third international symposium on information processing in sensor networks, IPSN, 26–27 Apr., pp 259–268
24.
Zurück zum Zitat Pilosof S, Ramjee R, Raz D, Shavitt Y, Sinha P (2003) Understanding TCP fairness over a wireless LAN. In: Proceedings of the INFOCOM 2003 v. 2, 30 Mar.–3 Apr., pp 863–872 Pilosof S, Ramjee R, Raz D, Shavitt Y, Sinha P (2003) Understanding TCP fairness over a wireless LAN. In: Proceedings of the INFOCOM 2003 v. 2, 30 Mar.–3 Apr., pp 863–872
25.
Zurück zum Zitat Sankaranarayanan S, Papadimitratos P, Mishra A, Hershey S (2005) A bandwidth sharing approach to improve licensed spectrum utilization. In Proceedings of the IEEE DySPAN, Nov. 8–11, pp 279–288 Sankaranarayanan S, Papadimitratos P, Mishra A, Hershey S (2005) A bandwidth sharing approach to improve licensed spectrum utilization. In Proceedings of the IEEE DySPAN, Nov. 8–11, pp 279–288
26.
Zurück zum Zitat Shirey R (2000) RFC 2828: internet security glossary. IETF, May Shirey R (2000) RFC 2828: internet security glossary. IETF, May
27.
Zurück zum Zitat Stallings W (2006) Network security essentials: applications and standards, 3rd edn. Prentice Hall, Upper Saddle River, NJ, p 432 Stallings W (2006) Network security essentials: applications and standards, 3rd edn. Prentice Hall, Upper Saddle River, NJ, p 432
28.
Zurück zum Zitat Ståhlberg M (2000) Radio jamming attacks against two popular mobile networks. In: Lipmaa H, Pehu-Lehtonen H, (eds) Helsinki University of Technology, Helsinki Ståhlberg M (2000) Radio jamming attacks against two popular mobile networks. In: Lipmaa H, Pehu-Lehtonen H, (eds) Helsinki University of Technology, Helsinki
30.
Zurück zum Zitat Wenyuan X, Wade T, Yanyong Z, Timothy W (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM international symposium on mobile ad hoc networking and computing, Illinois, pp 46–57 Wenyuan X, Wade T, Yanyong Z, Timothy W (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of ACM international symposium on mobile ad hoc networking and computing, Illinois, pp 46–57
Metadaten
Titel
Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment
verfasst von
Timothy X Brown
Amita Sethi
Publikationsdatum
01.10.2008
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 5/2008
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-008-0085-x

Weitere Artikel der Ausgabe 5/2008

Mobile Networks and Applications 5/2008 Zur Ausgabe

Neuer Inhalt