Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks

With the advent of cognitive radios, existing wireless networks are expected to undergo a radical change in how they operate. Traditional wireless devices operate in fixed frequency bands and follow fixed network protocols set at the time of manufacture, unlike the emerging wireless devices based on cognitive radio technology which are expected to operate across multiple frequency bands with a variety of protocols that can change over the life of the device. While the wireless networks in which a cognitive radio device operates may implement device authentication, integrity checks and other higher-layer security mechanisms; the possibility of physical layer attacks, such as jamming attacks, still exists. This research work focuses on assessing potential cognitive radio specific physical layer attacks using the so-called Hammer model. In particular, we investigate vulnerabilities that may prevent CR communication in specific bands, completely deny a cognitive radio to communicate or induce it to cause harmful interference to existing users; so called denial-of-service attacks. In the process, we identify, analyze, and assess the risk level posed by the potential attacks in the different CR design paradigms proposed by different research groups. Further, this work recommends the most and least susceptible of the CR design paradigms under consideration.

[1]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[2]  J. A. Volpe Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning Syst , 2001 .

[3]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[4]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[5]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[6]  T. Brown,et al.  Potential Cognitive Radio Denial of Service Attacks and Remedies , 2007 .

[7]  J.M. Chapin,et al.  Time-Limited Leases for Innovative Radios , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[8]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[9]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[10]  Department of Transportation Federal Aviation Administration 14 Cfr Part 91 Automatic Dependent Surveillance— Broadcast (ads–b) out Performance Requirements to Support Air Traffic Control (atc) Service; Final Rule Department of Transportation Federal Aviation Administration 14 Cfr Part 91 Automatic , 2022 .

[11]  L. Ma,et al.  Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[12]  Ilan Hen,et al.  MIMO Architecture for Wireless Communication , 2006 .

[13]  Panagiotis Papadimitratos,et al.  A bandwidth sharing approach to improve licensed spectrum utilization , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[14]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[15]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[16]  A. Schaplowsky Handbook of System and Product Safety , 1974 .

[17]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[18]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .