hacking wireless networks of the future: security …...hacking wireless networks of the future:...
TRANSCRIPT
![Page 1: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/1.jpg)
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
Hunter Scott / August 3, 2013
![Page 2: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/2.jpg)
Radio
![Page 3: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/3.jpg)
+
Software Defined Radio
![Page 4: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/4.jpg)
Cognitive Radio
+
![Page 5: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/5.jpg)
Cognitive Radio Network
![Page 6: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/6.jpg)
![Page 7: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/7.jpg)
![Page 8: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/8.jpg)
![Page 9: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/9.jpg)
![Page 10: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/10.jpg)
Cognitive Engine
![Page 11: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/11.jpg)
Center Frequency
Bandwidth
Transmit power
Type of modulation
Coding rate
Channel access protocol
Encryption algorithm
Frame size
![Page 12: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/12.jpg)
![Page 13: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/13.jpg)
![Page 14: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/14.jpg)
![Page 15: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/15.jpg)
![Page 16: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/16.jpg)
![Page 17: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/17.jpg)
![Page 18: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/18.jpg)
![Page 19: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/19.jpg)
![Page 20: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/20.jpg)
![Page 21: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/21.jpg)
![Page 22: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/22.jpg)
![Page 23: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/23.jpg)
![Page 24: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/24.jpg)
![Page 25: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/25.jpg)
Attacks specific to cognitive radio networks
![Page 26: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/26.jpg)
![Page 27: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/27.jpg)
![Page 28: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/28.jpg)
![Page 29: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/29.jpg)
Change cognitive messages being sent through network
![Page 30: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/30.jpg)
Change cognitive messages being sent through network
Incumbent on channel 6
![Page 31: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/31.jpg)
Incumbent on channel 6
Change cognitive messages being sent through network
![Page 32: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/32.jpg)
Incumbent on channel 1
Change cognitive messages being sent through network
![Page 33: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/33.jpg)
Incumbent on channel 1
Change cognitive messages being sent through network
![Page 34: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/34.jpg)
Recalculating…
Change cognitive messages being sent through network
![Page 35: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/35.jpg)
Routing Disruption
![Page 36: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/36.jpg)
Sybil Attack
![Page 37: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/37.jpg)
Sybil Attack
![Page 38: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/38.jpg)
Sybil Attack
![Page 39: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/39.jpg)
Sybil Attack
![Page 40: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/40.jpg)
Priority Attack
![Page 41: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/41.jpg)
>
![Page 42: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/42.jpg)
Attacks on Crypto
![Page 43: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/43.jpg)
VS
![Page 44: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/44.jpg)
Attacks on Data Privacy
![Page 45: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/45.jpg)
![Page 46: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/46.jpg)
Primary User Emulation
![Page 47: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/47.jpg)
Primary User Emulation
![Page 48: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/48.jpg)
Primary User Emulation
Primary user on
channel 4
Primary user on
channel 4
Primary user on
channel 4
Primary user on
channel 4
![Page 49: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/49.jpg)
Primary User Emulation
Primary user on channel 4
![Page 50: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/50.jpg)
Primary User Emulation
Recalculating…
![Page 51: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/51.jpg)
Countermeasures
![Page 52: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/52.jpg)
Cooperative Intrusion Detection
![Page 53: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/53.jpg)
![Page 54: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/54.jpg)
Device Reputation
![Page 55: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/55.jpg)
Device Location
![Page 56: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/56.jpg)
Why this matters
![Page 57: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/57.jpg)
![Page 58: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/58.jpg)
![Page 59: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/59.jpg)
![Page 60: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/60.jpg)
Tools
![Page 61: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/61.jpg)
![Page 62: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/62.jpg)
![Page 63: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/63.jpg)
Level
30 MHz to 4.4 GHz 60 mW SimpliciTI Fits Arduino shields ~$100 in quantity
![Page 64: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/64.jpg)
![Page 65: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/65.jpg)
![Page 66: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/66.jpg)
![Page 67: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/67.jpg)
![Page 68: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/68.jpg)
![Page 69: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/69.jpg)
![Page 70: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/70.jpg)
![Page 71: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/71.jpg)
![Page 72: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/72.jpg)
![Page 73: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/73.jpg)
MyriadRF ($300)
Other tools
HackRF ($300)
Michael Ossmann Azio
BladeRF ($420)
Nuand
![Page 74: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/74.jpg)
What’s next
![Page 75: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/75.jpg)
Latest version of these slides + code & schematics:
defcon21.hscott.net
![Page 76: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/76.jpg)
Image Credits:
Radio designed by Monika Ciapala from The Noun Project
Radio Tower designed by iconoci from The Noun Project
Brain designed by Samuel Dion-Girardeau from The Noun Project
Person designed by Björn Andersson from The Noun Project
Plant designed by Luke Anthony Firth from The Noun Project
Lock from The Noun Project
Speedometer designed by Volodin Anton from The Noun Project
Location designed by Ricardo Moreira from The Noun Project
![Page 77: Hacking Wireless Networks of the Future: Security …...Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks Hunter Scott / August 3, 2013 Radio + Software](https://reader030.vdocuments.us/reader030/viewer/2022040613/5f0813d97e708231d42038c1/html5/thumbnails/77.jpg)
Further Reading:
FCC. In the matter of unlicensed operation in the TV broadcast bands: second report and order and memorandum opinion and order., Nov. 2008.
Fadlullah, Zubair Md, et al. "An Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks." IEEE Network (2013): 52.
Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." (2013).
Du, Jiang, Chunjiao Zhu, and Zhaohui Chen. "Security issues in cooperative spectrum sensing for cognitive radio network." 2012 International Conference on Graphic and Image Processing. International Society for Optics and Photonics, 2013.
For even more readings, see the references of these papers.