Research Article
Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
Table 1
Attack classes, associated attacks (in bold) and vulnerabilities.
| Attack classes | Attacks/vulnerabilities |
| Radio control | Software injection (i) Buffer overflow (ii) Waveform download vulnerabilities (iii) Start-up vulnerabilities |
| Personification | Replay (i) Protocol vulnerabilities Authentication break GPS spoofing |
| Unauthorized data modification | Software injection Hardware injection (i) Implementation vulnerabilities (ii) Hardware trojans (iii) Device cloning |
| Unauthorized access to data | Hardware injection Software injection Traffic analysis attacks Side-channel attacks Fault-based attacks Social engineering attacks |
| Denial of service | Hardware injection Software injection Jamming Flooding |
|
|