Authors: Andre' Abadie; Duminda Wijesekera
Addresses: George Mason University, 4400 University Drive, Fairfax, VA 22030, USA ' George Mason University, 4400 University Drive, Fairfax, VA 22030, USA
Abstract: Though research in the vulnerabilities of cognitive radio exists, few explore the threat vectors against both the cognitive engine and the underlying SDR infrastructure within which it operates. Presenting a risk assessment methodology, this paper takes such a holistic approach and then further contributes to the research area by offering three misuse cases that portray how the vulnerabilities discussed could be exploited. Specifically, these cases visualise the risk environment based on a denial of service, an advanced persistent threat, and an insider threat and will allow for security practitioners to anticipate how their organisations may be impacted. Finally, suggested techniques for mitigation of these risks are discussed. As with all emerging technologies, there are a number of unknown conditions or influences that will shape the eventual realisation of its maturity. Risk management is the best mechanism to address those unknowns.
Keywords: software defined radio; SDR; cognitive radio; information security; computer security; vulnerabilities; threats; attack vectors; misuse cases; risk assessment; risk mitigation; risk engine; policy engine; trusted computer base; TCB; risk management.
International Journal of Information Privacy, Security and Integrity, 2013 Vol.1 No.4, pp.344 - 359
Available online: 10 Dec 2013Full-text access for editors Access for subscribers Purchase this article Comment on this article