Reference Hub1
Classes of Attacks for Tactical Software Defined Radios

Classes of Attacks for Tactical Software Defined Radios

Fabrício A. B. da Silva, David F. C. Moura, Juraci F. Galdino
Copyright: © 2012 |Volume: 3 |Issue: 4 |Pages: 26
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781466612020|DOI: 10.4018/jertcs.2012100104
Cite Article Cite Article

MLA

da Silva, Fabrício A. B., et al. "Classes of Attacks for Tactical Software Defined Radios." IJERTCS vol.3, no.4 2012: pp.57-82. http://doi.org/10.4018/jertcs.2012100104

APA

da Silva, F. A., Moura, D. F., & Galdino, J. F. (2012). Classes of Attacks for Tactical Software Defined Radios. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 3(4), 57-82. http://doi.org/10.4018/jertcs.2012100104

Chicago

da Silva, Fabrício A. B., David F. C. Moura, and Juraci F. Galdino. "Classes of Attacks for Tactical Software Defined Radios," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 3, no.4: 57-82. http://doi.org/10.4018/jertcs.2012100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This survey presents a classification of attacks that Software Communications Architecture (SCA) compliant Software Defined Radios (SDR) can suffer. This paper also discusses how attack mitigation strategies can impact the development of a SCA-compliant software infrastructure and identifies several research directions related to SDR security. The SCA standard was originally proposed by the Joint Tactical Radio System program (JTRS), which is a program for the development of military tactical radios sponsored by the US Department of Defense. The classification presented in this paper is based on attack results on the radio set, which can also be associated with the adversary’s objectives when planning an intrusion. The identification of classes of attacks on a radio, along with the associated threats and vulnerabilities, is the first step in engineering a secure SDR system. It precedes the identification of security requirements and the development of security mechanisms. Therefore, the identification of classes of attacks is a necessary step for the definition of realistic and relevant security requirements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.