2016
DOI: 10.1109/tcomm.2016.2535257
|View full text |Cite
|
Sign up to set email alerts
|

Disruptive Attacks on Video Tactical Cognitive Radio Downlinks

Abstract: We consider video transmission over a mobile cognitive radio (CR) system operating in a hostile environment where an intelligent adversary tries to disrupt communications. We investigate the optimal strategy for spoofing, desynchronizing, and jamming a cluster-based CR network with a Gaussian noise signal over a slow Rayleigh fading channel. The adversary can limit access for secondary users (SUs) by either transmitting a spoofing signal in the sensing interval, or a desynchronizing signal in the code acquisit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Optimal spoofing for an adversary with a limited power budget under additive white Gaussian noise (AWGN) was derived and analyzed in [11], [23], and [24]. This work was extended for fading propagation environments in [25] and [26]. However, it was assumed that the adversary knows spectral usage status perfectly.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Optimal spoofing for an adversary with a limited power budget under additive white Gaussian noise (AWGN) was derived and analyzed in [11], [23], and [24]. This work was extended for fading propagation environments in [25] and [26]. However, it was assumed that the adversary knows spectral usage status perfectly.…”
Section: A Related Workmentioning
confidence: 99%
“…That is,ñ S = n S . Substituting (26) into (20), the formulation of the proposed spoofing reduces to…”
Section: Intelligent Transition For Different Scenariosmentioning
confidence: 99%