Disruptive Attacks on Video Tactical Cognitive Radio

semanticscholar(2016)

Cited 0|Views1
No score
Abstract
We consider video transmission over a mobile cognitive radio (CR) system operating in a hostile environment where an intelligent adversary tries to disrupt communications. We investigate the optimal strategy for spoofing, desynchronizing, and jamming a cluster-based CR network with a Gaussian noise signal over a slow Rayleigh fading channel. The adversary can limit access for secondary users (SUs) by either transmitting a spoofing signal in the sensing interval, or a desynchronizing signal in the code acquisition interval. By jamming the network during the transmission interval, the adversary can reduce the rate of successful transmission. We show how the adversary can optimally allocate its energy across subcarriers during sensing, code acquisition, and transmission intervals. We determine a worst-case optimal energy allocation for spoofing, desynchronizing, and jamming, which gives an upper bound to the received video distortion of SUs. We also propose cross-layer resource allocation algorithms and evaluate their performance under disruptive attacks.
More
Translated text
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined