Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2012, Article ID 703642, 9 pages
Research Article

Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

Divisão de Tecnologia da Informação, Centro Tecnológico do Exército, Avenida das Américas, Prédio D10, Guaratiba, 28705 Rio de Janeiro, RJ, Brazil

Received 9 May 2012; Revised 9 November 2012; Accepted 25 November 2012

Academic Editor: Rui Zhang

Copyright © 2012 David Fernandes Cruz Moura et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.