An approach for risk assessment and mitigation in cognitive radio technologies Online publication date: Sat, 19-Jul-2014
by Andre' Abadie; Duminda Wijesekera
International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 4, 2013
Abstract: Though research in the vulnerabilities of cognitive radio exists, few explore the threat vectors against both the cognitive engine and the underlying SDR infrastructure within which it operates. Presenting a risk assessment methodology, this paper takes such a holistic approach and then further contributes to the research area by offering three misuse cases that portray how the vulnerabilities discussed could be exploited. Specifically, these cases visualise the risk environment based on a denial of service, an advanced persistent threat, and an insider threat and will allow for security practitioners to anticipate how their organisations may be impacted. Finally, suggested techniques for mitigation of these risks are discussed. As with all emerging technologies, there are a number of unknown conditions or influences that will shape the eventual realisation of its maturity. Risk management is the best mechanism to address those unknowns.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information Privacy, Security and Integrity (IJIPSI):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com