Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment

Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio development.

[1]  Jeffrey H. Reed,et al.  Outage probability based comparison of underlay and overlay spectrum sharing techniques , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[2]  William Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[3]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[4]  Prasun Sinha,et al.  Understanding TCP fairness over wireless LAN , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[6]  D. Sicker,et al.  Can Cognitive Radio Support Broadband Wireless Access? , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[7]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[8]  J.M. Chapin,et al.  Time-Limited Leases for Innovative Radios , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[9]  Mika Ståhlberg Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .

[10]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[11]  J. A. Volpe Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning Syst , 2001 .

[12]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[13]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[14]  Allen D. Householder,et al.  Managing the Threat of Denial-of-Service Attacks , 2001 .

[15]  Panagiotis Papadimitratos,et al.  A bandwidth sharing approach to improve licensed spectrum utilization , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[16]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[17]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[18]  T. Brown,et al.  Potential Cognitive Radio Denial of Service Attacks and Remedies , 2007 .

[19]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[20]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[21]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[22]  Martin Heusse,et al.  Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Acm Sigmobile MobiHoc 2006 : proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, May 22-25, 2006, Florence, Italy , 2006 .