Denial-of-service attacks on dynamic spectrum access networks

G. Jakimoski, K. P. Subbalakshmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

35 Scopus citations

Abstract

Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wireless applications since cognitive radios have the potential to utilize the idle licensed spectrum bands in an intelligent way without interfering with other licensed devices. However, most of the proposed protocols for opportunistic usage of the licensed spectrum bands assume that the participants involved in the protocols are honest and that there are no malicious adversaries that will attack the network. Using two examples, we demonstrate that in the presence of a malicious adversary the systems designed making these assumptions will fail to fulfill their goals of minimal disruption of the primary users and efficient utilization of the unused spectrum. We also briefly discuss some security design goals of the future cognitive DSA networks.

Original languageEnglish
Title of host publicationICC 2008 - 2008 IEEE International Conference on Communications Workshops, Workshops Proceedings
Pages524-528
Number of pages5
DOIs
StatePublished - 2008
EventICC 2008 - 2008 IEEE International Conference on Communications Workshops - Beijing, China
Duration: 19 May 200823 May 2008

Publication series

NameIEEE International Conference on Communications
ISSN (Print)0536-1486

Conference

ConferenceICC 2008 - 2008 IEEE International Conference on Communications Workshops
Country/TerritoryChina
CityBeijing
Period19/05/0823/05/08

Keywords

  • Cognitive radio
  • Denial-of-service
  • Dynamic spectrum access
  • Overlay networks
  • Security

Fingerprint

Dive into the research topics of 'Denial-of-service attacks on dynamic spectrum access networks'. Together they form a unique fingerprint.

Cite this