Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks

  title={Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks},
  author={Ankit Sethi and T X Brown},
  journal={2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks},
With the advent of cognitive radios, existing wireless networks are expected to undergo a radical change in how they operate. Traditional wireless devices operate in fixed frequency bands and follow fixed network protocols set at the time of manufacture, unlike the emerging wireless devices based on cognitive radio technology which are expected to operate across multiple frequency bands with a variety of protocols that can change over the life of the device. While the wireless networks in which… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 24 extracted citations


Publications referenced by this paper.
Showing 1-10 of 18 references

Luxhøj, Safety risk analysis of unmanned aircraft system (UAS) integration into the national airspace system (NAS): Phase 1, Office of Aviation Research and Development

  • J T.
  • 2008
1 Excerpt

Scope, Agenda, Workplan and Threat Definition for the Security Ad-Hoc in 802.22

  • A. Mody, R. Reddy, T. Kiernan, M. Sherman
  • IEEE 802. 22 Discussion Document 802. 22-08…
  • 2008

Alloco, Assurance Technologies Principles and Practice, 2nd ed., Hoboken, New Jersey

  • M.D.G. Raheja
  • 2006
1 Excerpt

Similar Papers

Loading similar papers…