Int. J. of Information Privacy, Security and Integrity   »   2013 Vol.1, No.4

 

 

Title: An approach for risk assessment and mitigation in cognitive radio technologies

 

Authors: Andre' Abadie; Duminda Wijesekera

 

Addresses:
George Mason University, 4400 University Drive, Fairfax, VA 22030, USA
George Mason University, 4400 University Drive, Fairfax, VA 22030, USA

 

Abstract: Though research in the vulnerabilities of cognitive radio exists, few explore the threat vectors against both the cognitive engine and the underlying SDR infrastructure within which it operates. Presenting a risk assessment methodology, this paper takes such a holistic approach and then further contributes to the research area by offering three misuse cases that portray how the vulnerabilities discussed could be exploited. Specifically, these cases visualise the risk environment based on a denial of service, an advanced persistent threat, and an insider threat and will allow for security practitioners to anticipate how their organisations may be impacted. Finally, suggested techniques for mitigation of these risks are discussed. As with all emerging technologies, there are a number of unknown conditions or influences that will shape the eventual realisation of its maturity. Risk management is the best mechanism to address those unknowns.

 

Keywords: software defined radio; SDR; cognitive radio; information security; computer security; vulnerabilities; threats; attack vectors; misuse cases; risk assessment; risk mitigation; risk engine; policy engine; trusted computer base; TCB; risk management.

 

DOI: 10.1504/IJIPSI.2013.058208

 

Int. J. of Information Privacy, Security and Integrity, 2013 Vol.1, No.4, pp.344 - 359

 

Available online: 10 Dec 2013

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article