Securing cognitive radio networks
✍ Scribed by O. León; J. Hernández-Serrano; M. Soriano
- Publisher
- John Wiley and Sons
- Year
- 2010
- Tongue
- English
- Weight
- 478 KB
- Volume
- 23
- Category
- Article
- ISSN
- 1074-5351
- DOI
- 10.1002/dac.1102
No coin nor oath required. For personal study only.
✦ Synopsis
Abstract
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. Our objective in this paper is to analyze the security issues of the main recent developments and architectures of cognitive radio networks. We present vulnerabilities inherent to those systems, identify novel types of abuse, classify attacks, and analyze their impact on the operation of cognitive radio‐based systems. Moreover, we discuss and propose security solutions to mitigate such threats. Copyright © 2010 John Wiley & Sons, Ltd.
📜 SIMILAR VOLUMES
The HIPAA regulations establish national standards on all healthcare systems, including digital medical imaging transactions. They outline a comprehensive risk analysis assisting in investigations of possible security breaches 1 . Such regulations are particularly important to medical imaging becaus
Security 13 eliminating the collateral damage of P2P applications. However, this won't address the vulnerability of files held on laptops or homeworkers' PCs used beyond the organisation's boundaries. For the time being, your best defence in these circumstances is education about the dangers. But we