Achieving RF Jamming with DSA-Enabled Cognitive Radio Swarms: A Guide to Trends, Technologies, and Approaches in the Information Sciences

Achieving RF Jamming with DSA-Enabled Cognitive Radio Swarms: A Guide to Trends, Technologies, and Approaches in the Information Sciences

Robert L. Foster Jr.
ISBN13: 9781466650633|ISBN10: 146665063X|EISBN13: 9781466650640
DOI: 10.4018/978-1-4666-5063-3.ch005
Cite Chapter Cite Chapter

MLA

Foster Jr., Robert L. "Achieving RF Jamming with DSA-Enabled Cognitive Radio Swarms: A Guide to Trends, Technologies, and Approaches in the Information Sciences." Emerging Methods in Predictive Analytics: Risk Management and Decision-Making, edited by William H. Hsu, IGI Global, 2014, pp. 83-95. https://doi.org/10.4018/978-1-4666-5063-3.ch005

APA

Foster Jr., R. L. (2014). Achieving RF Jamming with DSA-Enabled Cognitive Radio Swarms: A Guide to Trends, Technologies, and Approaches in the Information Sciences. In W. Hsu (Ed.), Emerging Methods in Predictive Analytics: Risk Management and Decision-Making (pp. 83-95). IGI Global. https://doi.org/10.4018/978-1-4666-5063-3.ch005

Chicago

Foster Jr., Robert L. "Achieving RF Jamming with DSA-Enabled Cognitive Radio Swarms: A Guide to Trends, Technologies, and Approaches in the Information Sciences." In Emerging Methods in Predictive Analytics: Risk Management and Decision-Making, edited by William H. Hsu, 83-95. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5063-3.ch005

Export Reference

Mendeley
Favorite

Abstract

Recent studies prove that the current method of statically allocating and assigning RF spectrum is restrictive and inefficient and identify Dynamic Spectrum Access (DSA) as a feasible alternative. The author defines a system design which implemenst a declarative policy language using Semantic Web technologies. Swarms of multi-band, reconfigurable Cognitive Radio (CR) technology with fast channel switching and real time spectrum sensing capabilities have been identified as candidates for Multi-Channel Jamming Electronic Attacks (EA). Past demonstrations have shown that a single CR can be deployed in an EA on 802.11 networks. To extend the behavior of CRs beyond single multi-channel jamming, this chapter introduces a system architecture design that relies on a minimal set of CR capabilities to reduce the cost of designing the system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.