2009 Second International Workshop on Cross Layer Design 2009
DOI: 10.1109/iwcld.2009.5156526
|View full text |Cite
|
Sign up to set email alerts
|

A new cross-layer attack to TCP in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(27 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…[13] specifies the objective function attack which disrupts the artificial intelligence learning algorithms of cognitive radios. [14] and [15] discuss how the attacker compromises the transport (TCP) and MAC (IEEE 802.22) layer protocol in CR networks. [16]- [19] concentrate on the detection of the unknown/unauthorized users or malicious users sending out erroneous messages deliberately in CR networks.…”
Section: Introductionmentioning
confidence: 99%
“…[13] specifies the objective function attack which disrupts the artificial intelligence learning algorithms of cognitive radios. [14] and [15] discuss how the attacker compromises the transport (TCP) and MAC (IEEE 802.22) layer protocol in CR networks. [16]- [19] concentrate on the detection of the unknown/unauthorized users or malicious users sending out erroneous messages deliberately in CR networks.…”
Section: Introductionmentioning
confidence: 99%
“…First, it is pointed out in [43] that a reliable control channel to disseminate spectrum-related parameters has a vital effect and calls for investigation. Also, the issue of security vulnerability at the transport layer is raised in [119]. For instance, malicious parties could pose themselves as sources of monitored spectral events by generating signals bearing certain features.…”
Section: Discussionmentioning
confidence: 99%
“…Unguarded nodes would accordingly vacate the channel and look for a new frequency, during which the transmission is interrupted and the loss of ACK packets reduces the congestion window. Persistent attacks on multiple channels sometimes can even cut off the connection permanently [119]. Furthermore, existing literature has largely focused on TCP.…”
Section: Discussionmentioning
confidence: 99%
“…We defined the Lion attack in [21] as a jamming targeted to reduce the throughput of Transmission Control Protocol (TCP) by forcing frequency handoffs. The handoff process involves sensing the medium looking for vacant channels and choosing the best one according to some criteria, thus incurring high latencies until the transmission is resumed.…”
Section: Lion Attackmentioning
confidence: 99%