Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense

  title={Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense},
  author={Yi Tan and Kai Hong and Shamik Sengupta and K. P. Subbalakshmi},
  journal={2011 IEEE International Conference on Communications (ICC)},
In this paper, we investigate Sybil attacks on spectrum allocation in distributed dynamic spectrum access (DSA) networks. Using IEEE 802.11 devices as secondary nodes, we demonstrate the feasibility of mounting Sybil attacks in the cognitive radio testbed, in which the malicious node poses as multiple normal secondary nodes with different identities in order to steal more spectrum bands. We also show the impact of the attack through an example and simulation results. A defense strategy using… CONTINUE READING


Publications referenced by this paper.

The 802.11 tutorial

  • M. Ergen
  • Tech. Rep., . [Online]. Available: http://wow…
  • 2002
Highly Influential
2 Excerpts

In the matter of unlicensed operation in the TV broadcast bands

  • C.F.C.
  • Second Report and Order and Memorandum Opinion…
  • 2008
1 Excerpt

Similar Papers

Loading similar papers…