Research Article

Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

Table 1

Attack classes, associated attacks (in bold) and vulnerabilities.

Attack classesAttacks/vulnerabilities

Radio controlSoftware injection
(i) Buffer overflow
(ii) Waveform download vulnerabilities
(iii) Start-up vulnerabilities

PersonificationReplay
(i) Protocol vulnerabilities
Authentication break
GPS spoofing

Unauthorized data modificationSoftware injection
Hardware injection
(i) Implementation vulnerabilities
(ii) Hardware trojans
(iii) Device cloning

Unauthorized access to dataHardware injection
Software injection
Traffic analysis attacks
Side-channel attacks
Fault-based attacks
Social engineering attacks

Denial of serviceHardware injection
Software injection
Jamming
Flooding