Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strat...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2012-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2012/703642 |
id |
doaj-2bcd86d9f09043f5a19378a6e6a158c0 |
---|---|
record_format |
Article |
spelling |
doaj-2bcd86d9f09043f5a19378a6e6a158c02020-11-24T23:15:17ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2012-01-01201210.1155/2012/703642703642Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined RadiosDavid Fernandes Cruz Moura0Fabricio Alves Barbosa da Silva1Juraci Ferreira Galdino2Divisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilDivisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilDivisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilThis paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.http://dx.doi.org/10.1155/2012/703642 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
David Fernandes Cruz Moura Fabricio Alves Barbosa da Silva Juraci Ferreira Galdino |
spellingShingle |
David Fernandes Cruz Moura Fabricio Alves Barbosa da Silva Juraci Ferreira Galdino Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios Journal of Computer Networks and Communications |
author_facet |
David Fernandes Cruz Moura Fabricio Alves Barbosa da Silva Juraci Ferreira Galdino |
author_sort |
David Fernandes Cruz Moura |
title |
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios |
title_short |
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios |
title_full |
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios |
title_fullStr |
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios |
title_full_unstemmed |
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios |
title_sort |
case studies of attacks over adaptive modulation based tactical software defined radios |
publisher |
Hindawi Limited |
series |
Journal of Computer Networks and Communications |
issn |
2090-7141 2090-715X |
publishDate |
2012-01-01 |
description |
This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications. |
url |
http://dx.doi.org/10.1155/2012/703642 |
work_keys_str_mv |
AT davidfernandescruzmoura casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios AT fabricioalvesbarbosadasilva casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios AT juraciferreiragaldino casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios |
_version_ |
1725591293721051136 |