Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strat...

Full description

Bibliographic Details
Main Authors: David Fernandes Cruz Moura, Fabricio Alves Barbosa da Silva, Juraci Ferreira Galdino
Format: Article
Language:English
Published: Hindawi Limited 2012-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2012/703642
Description
Summary:This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.
ISSN:2090-7141
2090-715X