2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications

Research Article

Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment

  • @INPROCEEDINGS{10.1109/CROWNCOM.2007.4549841,
        author={Timothy X Brown and Amita Sethi},
        title={Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment},
        proceedings={2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications},
        publisher={IEEE},
        proceedings_a={CROWNCOM},
        year={2008},
        month={6},
        keywords={Cognitive radio; denial of service; vulnerability; countermeasure},
        doi={10.1109/CROWNCOM.2007.4549841}
    }
    
  • Timothy X Brown
    Amita Sethi
    Year: 2008
    Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment
    CROWNCOM
    IEEE
    DOI: 10.1109/CROWNCOM.2007.4549841
Timothy X Brown1,*, Amita Sethi1,*
  • 1: Interdisciplinary Telecommunications Electrical and Computer Engineering University of Colorado, Boulder, CO 80309
*Contact email: timxb@colorado.edu, sethi@colorado.edu

Abstract

Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio development.