@inproceedings{e38fa2bd225f48f689881cd0b4145644,
title = "Denial-of-service attacks on dynamic spectrum access networks",
abstract = "Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wireless applications since cognitive radios have the potential to utilize the idle licensed spectrum bands in an intelligent way without interfering with other licensed devices. However, most of the proposed protocols for opportunistic usage of the licensed spectrum bands assume that the participants involved in the protocols are honest and that there are no malicious adversaries that will attack the network. Using two examples, we demonstrate that in the presence of a malicious adversary the systems designed making these assumptions will fail to fulfill their goals of minimal disruption of the primary users and efficient utilization of the unused spectrum. We also briefly discuss some security design goals of the future cognitive DSA networks.",
keywords = "Cognitive radio, Denial-of-service, Dynamic spectrum access, Overlay networks, Security",
author = "G. Jakimoski and Subbalakshmi, {K. P.}",
year = "2008",
doi = "10.1109/ICCW.2008.105",
language = "English",
isbn = "9781424420513",
series = "IEEE International Conference on Communications",
pages = "524--528",
booktitle = "ICC 2008 - 2008 IEEE International Conference on Communications Workshops, Workshops Proceedings",
note = "ICC 2008 - 2008 IEEE International Conference on Communications Workshops ; Conference date: 19-05-2008 Through 23-05-2008",
}