Tradeoff between spoofing and jamming a cognitive radio

@article{Peng2009TradeoffBS,
  title={Tradeoff between spoofing and jamming a cognitive radio},
  author={Qihang Peng and Pamela C. Cosman and Laurence B. Milstein},
  journal={2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers},
  year={2009},
  pages={25-29}
}
Recent studies show that spectrum sensing in cognitive radio exposes vulnerabilities to adversaries. An intelligent adversary can launch sensing disruption in the sensing duration, by putting spoofing signals in allowable bands to prevent secondary users from accessing. In the meantime, the adversary can also attack secondary users by traditional jamming, once they access the spectral bands and start transmission. Both attacks can significantly degrade the performance of a cognitive radio… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 11 REFERENCES

Worst-Case Sensing Deception in Cognitive Radio Networks

  • GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
  • 2009
VIEW 4 EXCERPTS

and L

S. S. Tan, M. Rim, P. C. Cosman
  • B. Milstein, “Adaptive Modulation for OFDM-based Multiple Description Progressive Image Transmission,” IEEE Globecom
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

and L

Q. H. Peng, P. C. Cosman
  • B. Milstein, “Optimal sensing disruption for a cognitive radio adversary,” submitted to IEEE Transactions on Vehicular Technology
  • 2009

Cognitive radio: brain-empowered wireless communications

  • IEEE Journal on Selected Areas in Communications
  • 2005
VIEW 1 EXCERPT

Spread Spectrum Communications

  • Encyclopedia of Wireless and Mobile Communications
  • 1983
VIEW 2 EXCERPTS