Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strat...

Full description

Bibliographic Details
Main Authors: David Fernandes Cruz Moura, Fabricio Alves Barbosa da Silva, Juraci Ferreira Galdino
Format: Article
Language:English
Published: Hindawi Limited 2012-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2012/703642
id doaj-2bcd86d9f09043f5a19378a6e6a158c0
record_format Article
spelling doaj-2bcd86d9f09043f5a19378a6e6a158c02020-11-24T23:15:17ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2012-01-01201210.1155/2012/703642703642Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined RadiosDavid Fernandes Cruz Moura0Fabricio Alves Barbosa da Silva1Juraci Ferreira Galdino2Divisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilDivisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilDivisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, BrazilThis paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.http://dx.doi.org/10.1155/2012/703642
collection DOAJ
language English
format Article
sources DOAJ
author David Fernandes Cruz Moura
Fabricio Alves Barbosa da Silva
Juraci Ferreira Galdino
spellingShingle David Fernandes Cruz Moura
Fabricio Alves Barbosa da Silva
Juraci Ferreira Galdino
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
Journal of Computer Networks and Communications
author_facet David Fernandes Cruz Moura
Fabricio Alves Barbosa da Silva
Juraci Ferreira Galdino
author_sort David Fernandes Cruz Moura
title Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
title_short Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
title_full Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
title_fullStr Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
title_full_unstemmed Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
title_sort case studies of attacks over adaptive modulation based tactical software defined radios
publisher Hindawi Limited
series Journal of Computer Networks and Communications
issn 2090-7141
2090-715X
publishDate 2012-01-01
description This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.
url http://dx.doi.org/10.1155/2012/703642
work_keys_str_mv AT davidfernandescruzmoura casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios
AT fabricioalvesbarbosadasilva casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios
AT juraciferreiragaldino casestudiesofattacksoveradaptivemodulationbasedtacticalsoftwaredefinedradios
_version_ 1725591293721051136