NETWORK ACCESS SECURITY POLICIES FOR COGNITIVE RADIOTransfer Agreement • June 15th, 2008
Contract Type FiledJune 15th, 2008In this paper we explore security access methods and techniques for Cognitive Radio (CR) and compare different methods for complexity of implementation, effectiveness and applicability. In Cognitive radio (CR), which changes frequency band of operation with software while technology is being developed and actually fielded in certain tactical applications and operations, security of accessing the spectrum is still undefined. With the cognitive approach any radio spectrum can be accessed with certain hardware and software combination. In order to use the spectrum efficiently, spectrum of use must be well defined for specific radio operation. Here, we first discuss different attacks in wireless communication at the physical layer. These generalized attacks apply to CR communications. The types of attacks are physical layer attacks which can cause network operation to malfunction or to stop completely. We then present three different methods for secured cognitive access over a defined spec