Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Security in Dynamic Spectrum Access Systems: A Survey

Zargar, Saman T and Weiss, Martin BH and Caicedo, Carlos E and Joshi, James BD Security in Dynamic Spectrum Access Systems: A Survey. Working Paper. UNSPECIFIED. (Submitted)

Available under License : See the attached license file.

Download (69kB) | Preview
[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)


Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack or exploit the network. Some recent research efforts have focused on studying security issues in cognitive radios but there are still significant security challenges in the implementation of DSA systems that have not been addressed. In this paper we focus on security issues in DSA. We identify various attacks (e.g., DoS attacks, system penetration, repudiation, spoofing, authorization violation, malware infection, data modification, etc.) and suggest various approaches to address them. We show that significant security issues exist that should be addressed by the research community if DSA is to find its way into production systems. We also show that, in many cases, existing approaches to securing IT systems can be applied to DSA and identify other DSA specific security challenges where additional research will be required.


Social Networking:
Share |


Item Type: Monograph (Working Paper)
Status: Submitted
CreatorsEmailPitt UsernameORCID
Zargar, Saman T
Weiss, Martin BHmbw@pitt.eduMBW0000-0001-6785-0913
Caicedo, Carlos E
Joshi, James BDjjoshi@pitt.eduJJOSHI0000-0003-4519-9802
Monograph Type: Working Paper
Institution: University of Pittsburgh
Schools and Programs: School of Information Sciences > Telecommunications
Uncontrolled Keywords: dynamic, spectrum, assignment, cognitive, radio, security, secondary, use
Date Deposited: 22 Jan 2010 16:33
Last Modified: 31 Jul 2020 18:55


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item