Poten&al Denial- of- Service Threat Assessment for Cogni&ve Radios

Size: px
Start display at page:

Download "Poten&al Denial- of- Service Threat Assessment for Cogni&ve Radios"

Transcription

1 oten&al Denial- of- Service Threat Assessment for Cogni&ve Radios Timothy X Brown*, Amita Sethi + *, + Interdisciplinary Telecommunica&ons *Electrical, Computer, and Energy Engineering University of Colorado, Boulder *Visi&ng rofessor Carnegie Mellon University, Rwanda resented at the ICT School on Applica&ons of Open Spectrum and White Spaces Technologies March 10,

2 Cogni&ve vs. Tradi&onal Radios User Interaction Via Operating System olicy Input Cognitive Engine Geo locator Sensor Radio A CR does more than a traditional radio 2

3 Cogni&ve Radios a Secure aradigm? Wireless Mobile Remotely Reconfigurable Opportunis&c Transmission based on Spectrum Availability Device s Spectrum Access Control via Spectrum olicies 3

4 Research Ques&on Which poten&al denial- of- service (DoS) awacks are cogni&ve radios suscep&ble to, what are the risks they represent, which security mechanisms can be employed to forestall the high- priority risk awacks, and which cogni&ve radio (CR) designs are the most suscep&ble to these cri&cal risks? 4

5 Denial- of- Service (DoS) AWacks DoS is the preven&on of authorized access to a system resource or the delaying of system opera&ons and func&ons [RFC2828]. 5

6 Tradi&onal DoS AWack Transmitter Receiver Communications Receiver Jamming 6

7 DoS AWack Categories Denial / Induce Deny Communication When Could Immediate DoS Induce Communication When Should Not Long term DoS 7

8 Example Denial AWacks Sensor Failures Scenario1: AWacker Emulates rimary User CR Attacker CR Detect Range Attacker Denies Access 8

9 Example Induce AWacks Sensor Failures Scenario 2: AWacker Masks rimary User`s Signals. U CR Attacker Attacker Induces CR to Interfere with rimary User 9

10 Example Denial/Induce AWacks olicy Failure in Beaconing System Spoofs Beacon Jams Beacon Intercepts CR Transmitter Range Misuses Operational Frequency Information to launch Denial/Induce attacks 10

11 CR Avenues of AWack Victim CR CR Detection Range Jam Received Signal Replay/Spoof/Relay acket Spoof Signal CR Jamming Range CR Receive Range CR Detect Range 11

12 AWack Analysis Methodology Hypothesize the AWack Scenario Iden&fy the Associated Threats Organize the Associated Threats in a Hammer Model framework Assign a Quan&ta&ve Risk Value to the AWack based on its Likelihood and Impact (Risk Assessment) 12

13 AWack Analysis: Threat Categoriza&on Ini&a&ng (Triggering Event) Associated (Other Causal Events) Contributory rimary (Outcome) 13

14 AWack Analysis: Hammer Model Framework Modeling tool to represent an awack scenario into a sequence of ini&a&ng and contributory threats that result in one of more primary threats. rimarily Used for Qualita&ve Scenario based AWack Analysis. Example Applica&on in System Safety Hazard Analysis in Federal Avia&on Administra&on. 14

15 Threats from Attackers Outside the CR system Threats from Within the Example Fuel Tank Rupture Scenario CR system DoS Outcomes 15

16 AWack Analysis: Risk Assessment (1/3) 1. Assess the Technical Likelihood of the AWack Rationale: Technical roblems to Attacker Likelihood Case Rank Insolvable Impossible 0 Strong Low 1 Solvable Medium 2 None High 3 16

17 AWack Analysis: Risk Assessment (2/3) Assess the Impact of the Attack Rationale: Impact on Victim Denial Attacks Induce Attacks Impact Case Rank None None None 0 erceptible but insignificant degradation in CR communication. Significant degradation but still operational CR communication. Non-operational CR communication erceptible but infrequent interference to active primary users erceptible frequent interference to active primary users Continuous interference to active primary users Low 1 Medium 2 High 3

18 AWack Analysis: Risk Assessment (3/3) 3. Risk Level = Likelihood Rank Х Impact Rank High MINOR MAJOR CRIT. CRIT. Medium Low Likelihood MINOR MINOR MAJOR CRIT. MINOR MINOR MINOR MAJOR None MINOR MINOR MINOR MINOR None Impact Low Medium High Risk Case Minor Major Critical Risk Mitigation Action No Countermeasures Required Threat cannot be Ignored Mandates High riority Handling 18

19 Research Methodology Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 19

20 Acceptable Risk Levels Every Cri&cal or Major Threats should be countered in the CR System. Any Major Threats with high likelihood but low impact, or low likelihood but high impact need to be countered but are ul&mately acceptable. Minor Threats can be ignored. 20

21 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 21

22 System Descrip&on Target System: Cogni&ve Radios Key Challenge: Mul&- Dimensional CR Configura&ons 22

23 Mul&- Dimensional CR Configura&ons Underlay Spectrum Access Method Overlay NoncooperativeCooperative Centralized Distributed Cooperative Spectrum Awareness Method Detection/ Sensing CR Network Architecture Beacon/ Control Signal Geo-locate/ Access DB 23

24 CR Network Architectures CR N/w Architectures Non- coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User CR Detect Range Victim CR Attacker Successfully Denies Access 24

25 CR Network Architectures CR N/w Architectures Distributed Coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User (Spoofs Sensor Input) Cooperative CR Network Collated Sensor Network Measurements make the attack less effective. 25

26 CR Network Architectures CR N/w Architectures Centralized Coopera&ve Non-Cooperative Cooperative Centralized Distributed Attacker Emulates rimary User Sensor Node Central Authority Active rimary Users Database CR Attack is Ineffective due to ossible Verification of Collated Network Measurement against Active rimary User s DB 26

27 Spectrum Access Methods Spectrum Access Methods Overlay Underlay Overlay Underlay CR CR Spoof Spoof CR CR does not React to rimary User Emulation CR is Denied Access Time CR Or Induced to Interfere 27

28 Spectrum Awareness Methods Spectrum Awareness Geo-locate/ Access DB Beacon/ Control Signal Detection/ Sensing rone to Location/ DB Spoof, Jam, Replay Geo-locate/ Access DB Detection/ Sensing rone to Sensing Spoof, Jam, Replay TV Database olicy Database Cellular Database Radar Database rimary Users Database Beacon/ Control Signal rone to Beacon/Control Signal Spoof, Jam, Relay RF Environment 28

29 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 29

30 DoS AWack Iden&fica&on ossible AWack Methods Considered Constant or Direct Jamming Intelligent Jamming Intercept or Eavesdropping Spoofing Replay Relay Cryptanalysis 30

31 DoS AWacks Iden&fied Against.. olicy, Sensor, Geo- loca&on and Other Networked Informa&on exchanged Between CR Elements in a Distributed CR. Among CRs in a Distributed Coopera&ve Setup. Between CRs and Central En&ty in a Centralized Coopera&ve Setup. From Central En&ty to Non- coopera&ve CRs. 31

32 DoS AWacks Iden&fied Against.. Networked CR Network En&&es such as Elements in a Distributed CR. Networked CRs in a Distributed Coopera&ve Setup. En&&es in a Centralized Coopera&ve Setup. Spectrum Informa&on Sensed by CR CR Transmission/Recep&on 32

33 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 33

34 Example AWack Analysis: rimary User Emula&on AWack in Non- Coopera&ve Architecture Attack reconditions Main Initiating Threat INITIATING THREATS Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) Attacker Spoofs/Replays Licensed User Transmissions On Every ossible Licensed Channel (S) AND asses Energybased rimary User Detection Technique AND CONTRIBUTORY THREATS SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS AND No Other On Device Spectrum Availability Data Validation Method Accessible (S) No Spectrum Availability Data Accessible From Co-operative Group Members (NC) AND SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON-DEVICE METHODS AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 34

35 Example AWack Analysis: rimary User Emula&on AWack in Coopera&ve Architectures INITIATING THREATS Attacker Spoofs/Replays Licensed User Transmissions in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Injects Spoofed Spectrum Availability Information in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Blocks Access to Networked Spectrum Availability Information In Multiple Cooperative Group Members ((DC) OR (CC)) Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) Attacker Spoofs or Replays Licensed User Transmissions On Every ossible Licensed Channel (S) AND asses Energybased rimary User Detection Technique AND CONTRIBUTORY THREATS asses Spectrum Availability Data Validation With Co-operative Group Members (CC) OR (DC) AND OR SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS No Other On Device Spectrum Availability Data Validation Method Accessible (S) OR AND SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON-DEVICE METHODS No Spectrum Availability Data Validation ossible With Co-operative Group Members (CC) OR (DC) AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 35

36 Example AWack Analysis: General Hammer Model for rimary User Emula&on AWack INITIATING THREATS Attacker Spoofs/Replays Licensed User Transmissions in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Injects Spoofed Spectrum Availability Information in Multiple Cooperative Group Members ((DC) OR (CC)) Attacker Blocks Access to Networked Spectrum Availability Information In Multiple Cooperative Group Members ((DC) OR (CC)) Spoofed Signal is detected by Victim, factors to consider: Attacker s Signal ower and Distance > Victim s signal detection threshold. Frequency of Victim Sensing. Spoofed Signal is relevant to the Victim, factors to consider: olicy requires CR to vacate licensed bands on detecting the presence of primary users. Attacker Spoofs or Replays Licensed User Transmissions on Target Channel (S) OR (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Injects Spoofed Spectrum Availability Information through Multiple Methods employed by the victim (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Blocks Spectrum Availability Information Access through Multiple Methods employed by the victim (S AND B) OR (S AND G) OR (S AND G AND B) Attacker Spoofs/Replays Licensed User Transmissions On Every ossible Licensed Channel (S) OR (S AND B) OR (S AND G) OR (S AND G AND B) AND asses Energybased rimary User Detection Technique AND asses Spectrum Availability Data Validation With On Device Methods (S AND B) OR (S AND G) OR (S AND G AND B) CONTRIBUTORY THREATS asses Spectrum Availability Data Validation With Cooperative Group Members (CC) OR (DC) AND OR No Other On Device Spectrum Availability Data Validation Method Accessible (S) SECTRUM AVAILABILITY DATA VALIDATION ACROSS MULTILE ON- DEVICE METHODS SECTRUM AVAILABILITY DATA VALIDATION ACROSS CO-OERATIVE GROU MEMBERS No Spectrum Availability Data Accessible From Co-operative Group Members (NC) OR ((CC OR DC) AND (No Sharing)) OR AND No Spectrum Availability Data Accessible from any other of Multiple Methods (S AND B) OR (S AND G) OR (S AND G AND B) No Spectrum Availability Data Validation ossible With Cooperative Group Members (CC) OR (DC) AND RIMARY THREATS revents CR Communication on Target Channel Induces Spectrum Handoff if CR is Operating on Target Channel Denies CR Communication 36

37 Example Risk Assessment Likely ossible Low Likelihood Spectrum Access Method: Overlay OR Underlay Spectrum Awareness Method: Detection/Sensing Impact Low Medium High Attack.. The Attacker Emulates rimary User Non- Cooperative Centralized Cooperative Distributed Cooperative On all Licensed Channels CRITICAL MAJOR MAJOR On Specific Licensed Channel MAJOR MINOR MINOR 37

38 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 38

39 Risk Management: hase I Risk Assessment Results (1/2) 39

40 Risk Management: hase I Risk Assessment Results (2/2) Cumulative CRITICAL Risk Value Non- Cooperative Centralized Cooperative Distributed Cooperative Total Risk Value Total CRITICAL + MAJOR Risk Value Beacon Cumulative MAJOR Risk Value Overlay Underlay Total Geo-locate Detection Beacon Geo-locate Detection Risk Database Sensing Database Sensing Value 18, 4 42, 6 12, 6 6, 8 30, 6 6, , 4 39, 6 9, 10 6, 8 27, 6 6, , 4 6, 9 6, 10 6, 8 6, 3 0,

41 Risk Management: Next Steps Devise Countermeasure for Above Acceptable Risk Level AWacks. Example: rimary User Emula&on AWack Mi&ga&on CR uses Feature based rimary User Detec&on Technique Modify CR System: Harden with Countermeasures 41

42 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Finalize System Design 42

43 hase II Risk Analysis Re- analyze High- riority AWacks for Modified CR System Re- assess Risk Level based on Likelihood and Impact 43

44 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 44

45 Risk Management: hase II Risk Assessment Results CR Configuration used in Non- Cooperative Centralized Cooperative Distributed Cooperative Total Risk Value Beacon Overlay Underlay Total Geo-locate Detection Beacon Geo-locate Detection Risk Database Sensing Database Sensing Value 6, 6 0, 9 0, 6 0, 7 0, 3 0, , 9 0, 9 0, 9 0, 3 0, 3 0, , 9 0, 9 0, 6 0, 3 0, 3 0, Least Vulnerable CR Configurations 45

46 Research Outline Define Acceptable Risk Levels System Description DoS Attack Identification: Identify DoS Attacks and Consequences Risk Analysis: Analyze Attacks and Identify Risks Risk Assessment: Consolidate and rioritize Risks Risk Management Risks Above Acceptable Risk Levels? Yes Risk Mitigation: Identify Countermeasures for high priority risks Modify System No Recommend System Design 46

47 CR Design Recommenda&ons Underlay Spectrum Access Method Overlay NoncooperativeCooperative Centralized Distributed Cooperative Spectrum Awareness Method Beacon/ Control Signal Detection/ Sensing CR Network Architecture Geo-locate/ Access DB 47

48 Conclusion CRs are suscep&ble to awacks. CRs open new avenues of awack. A Formal Risk Analysis and Assessment rocess can help guide the least vulnerable CR Design aradigm NOW is the best &me to devise countermeasures to reduce CR- specific vulnerabili&es. 48

49 References T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es and rotec&on Countermeasures: a Mul&- dimensional Analysis and Assessment, Journal Mobile Networks and Applica6ons, v. 13, n. 5, October 2008, pp , 17 p. A. Sethi, T. X Brown, Hammer Model Threat Assessment of Cogni&ve Radio Denial of Service AWacks, IEEE Dynamic Spectrum Access Networks (DySpAN), Chicago, Oct , T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es And rotec&on Countermeasures: A Mul&- dimensional Analysis/Assessment, roc. Second Int. Conf. on Cogni6ve Radio Oriented Wireless Networks and Communica6ons (CrownCom), Orlando, FL, Aug 1-3, pp. T. X Brown, A. Sethi, oten&al Cogni&ve Radio Denial- of- Service Vulnerabili&es and Countermeasures, in roc. Int. Symposium on Advanced Radio Technologies (ISART), Boulder, Feb February 25, 2008 Thesis Defense resentation 49

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on

From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected

More information

Cognitive Radio Network Security- A Survey

Cognitive Radio Network Security- A Survey Cognitive Radio Network Security- A Survey Roshan Singh Thakur Prof. Parul Bhanarkar Prof. Girish Agarwal ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL ABHA GAIKWAD-PATIL College of Engineering,Nagpur College

More information

European Responsible Care Forum. Security & Safe Maintenance

European Responsible Care Forum. Security & Safe Maintenance European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

IP CREW. Cogni,ve Radio Experimenta,on World

IP CREW. Cogni,ve Radio Experimenta,on World IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's

More information

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar

Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure. Talal El Awar Cyber Security and Power System Communica4ons Essen4al Parts of a Smart Grid Infrastructure Author: Goran N. Ericsson, Senior Member, IEEE Talal El Awar Submi.ed in Par3al Fulfillment of the Course Requirements

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Detecting & Eliminating Rogue Access Point in IEEE WLAN

Detecting & Eliminating Rogue Access Point in IEEE WLAN Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO

ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO ANALYSIS OF LINK EFFICIENCY AND HANDOFF WITH MOBILITY MANAGEMENT IN COGNITIVE RADIO Prof.Abdul Sayeed 1,Vinay Mengu 2,Sharikh Khan 3,Mohammed Moria 4 1,2,3,4 Department of Electronics & Telecommunication

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Assessing Medical Device. Cyber Risks in a Healthcare. Environment

Assessing Medical Device. Cyber Risks in a Healthcare. Environment Assessing Medical Device Medical Devices Security Cyber Risks in a Healthcare Phil Englert Director Technology Operations Environment Catholic Health Ini

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Business Case Components

Business Case Components How to Build A SOC Agenda Mission Business Case Components Regulatory requirements SOC Terminology Technology Components Events categories Staff Requirements Organiza>on s Considera>ons Training Requirements

More information

Spectrum Sharing Security and Attacks in CRNs: a Review

Spectrum Sharing Security and Attacks in CRNs: a Review Sharing Security and Attacks in CRNs: a Review Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar Department of Computer Science and Technology, University of Bedfordshire Luton, LU1 3JU, United Kingdom

More information

University ICT Security Certification. Francesco Ciclosi, University of Camerino

University ICT Security Certification. Francesco Ciclosi, University of Camerino University ICT Security Certification Francesco Ciclosi, University of Camerino 1 Is secure an organization complies with the standard ISO/IEC 27001? TRUE FALSE Is the standard ISO/IEC 27001 a metric of

More information

Tiger Scheme QST/CTM Standard

Tiger Scheme QST/CTM Standard Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)

More information

PhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015.

PhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015. PhD in Computer And Control Engineering XXVII cycle Torino February 27th, 2015. Parallel and reconfigurable systems are more and more used in a wide number of applica7ons and environments, ranging from

More information

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks IEEE 1900.4: Standard for Optimized Radio Resource Usage in Composite Wireless Networks Babak Siabi Isfahan University of Technology b.siabi@ec.iut.ac.ir Abstract Newly published IEEE 1900.4 standard is

More information

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives

More information

All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems

All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems Speaker: Zhe Zhou, zhouzhe@fudan.edu.cn Pre-Tenure Associate Professor, School of Computer Science, Fudan University, China This

More information

NERC History, Mission and Current Issues Southern States Energy Board. October 16, 2011

NERC History, Mission and Current Issues Southern States Energy Board. October 16, 2011 NERC History, Mission and Current Issues Southern States Energy Board October 16, 2011 Electricity Vital to America 2 RELIABILITY ACCOUNTABILITY Risk Curve with Actual Events Severity ( Log Base 10) 2003

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

Advanced IT Risk, Security management and Cybercrime Prevention

Advanced IT Risk, Security management and Cybercrime Prevention Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy

More information

Human Factors in Anonymous Mobile Communications

Human Factors in Anonymous Mobile Communications Human Factors in Anonymous Mobile Communications Svenja Schröder Research Group, University of Vienna Talk at the PhD School at the Android Security Symposium, September 9 th, 2015 in Vienna Svenja Schröder,

More information

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X

Courses. X E - Verify that system acquisitions policies and procedures include assessment of risk management policies X X 4016 Points * = Can include a summary justification for that section. FUNCTION 1 - INFORMATION SYSTEM LIFE CYCLE ACTIVITIES Life Cycle Duties No Subsection 2. System Disposition/Reutilization *E - Discuss

More information

Cyber Security Capabilities

Cyber Security Capabilities Cyber Security Capabilities Informa:on Assurance ü Vulnerability Assessment ü Penetra8on Tes8ng ü Informa8on Security Assessment ü Applica8on Security Evalua8on ü Network Traffic Assessment ü Cri8cality

More information

Integra(on of Accident Management Strategies into Sta(on Opera(on Fred Dermarkar Vice President Engineering Strategy Ontario Power Generation

Integra(on of Accident Management Strategies into Sta(on Opera(on Fred Dermarkar Vice President Engineering Strategy Ontario Power Generation Integra(on of Accident Management Strategies into Sta(on Opera(on Fred Dermarkar Vice President Engineering Strategy Ontario Power Generation IAEA International Expert Meeting on Human and Organizational

More information

Putting the Pieces Together:

Putting the Pieces Together: Putting the Pieces Together: Leveraging Current Audits to Solve the HITRUST Puzzle Presenter Gene Geiger, A-LIGN Partner - HITRUST Prac77oner CPA CISSP CCSK QSA PCIP ISO 27K LA performance resourceful

More information

New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11

New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 SISA Informa2on Security Formal Risk Assessment Specialists Authors of

More information

Threat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012

Threat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012 Threat modeling Tuomas Aura T- 110.4206 Informa1on security technology Aalto University, autumn 2012 Threats Threat = something bad that can happen Given an system or product Assets: what is there to protect?

More information

OWASP March 19, The OWASP Foundation Secure By Design

OWASP March 19, The OWASP Foundation   Secure By Design Secure By Design March 19, 2014 Rohini Sulatycki Senior Security Consultant Trustwave rsulatycki@trustwave.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this document

More information

CCW Workshop Technical Session on Mobile Cloud Compu<ng

CCW Workshop Technical Session on Mobile Cloud Compu<ng CCW Workshop Technical Session on Mobile Cloud Compu

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons Link Layer w/ credit to Rick Graziani (Cabrillo) for some of the anima

More information

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and

More information

DDoS PREVENTION TECHNIQUE

DDoS PREVENTION TECHNIQUE http://www.ijrst.com DDoS PREVENTION TECHNIQUE MADHU MALIK ABSTRACT A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its

More information

OPNET M-TCP model. Modupe Omueti

OPNET M-TCP model. Modupe Omueti OPNET M-TCP model Modupe Omueti momueti@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University Roadmap Introduction Motivation

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits How can I use ISA/IEC- 62443 (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits What is ISA 62443? A series of ISA standards that addresses

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

UNIT 1 Questions & Solutions

UNIT 1 Questions & Solutions UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 1, 2011 SURVEY: Physical Layer Security Announcements HW #1 is posted on main class website Due 2/10 @ 11:59pm (PST) Office hours on 2/1 will

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011

All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 Copyright 2009 American Water Works Association Copyright 2011 American Water Works Association Security

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS

COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS NUCLEAR REGULATORY AUTHORITY, GHANA COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS Nelson K. Agbemava ICT and Computer Security Section Head Instrumentation & ICT

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range A Better Space Mission Systems threat assessment by leveraging the National Cyber Range Chuck Allen (CISSP) & Jonathon Doubleday CORD Presented to GSAW, Feb-March 2018 2018 The Aerospace Corporation Abstract

More information

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey

Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey Applica@ons, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec. 2011. Sabita Maharjan

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

Autonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras

Autonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras Autonomic Mul,- s Security System for mul,- layered distributed architectures Chris,an Contreras Agenda Introduc,on Mul,- layered distributed architecture Autonomic compu,ng system Mul,- System (MAS) Autonomic

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

Service Discovery and Device Identification in Cognitive Radio Networks

Service Discovery and Device Identification in Cognitive Radio Networks B WiFi A T Bluetooth F WiFi Bluetooth C W E Cognitive Radio D Service Discovery and Device Identification in Cognitive Radio Networks 21 May 27 WINLAB Research Review Overview Cognitive Radio Introduction

More information

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection

More information

Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788

Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Outline Introduction - What is the problem? - What is the solution? - Motivating Example - How ABSP addresses these challenges?

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics

More information

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Risk Management Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Define

More information

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Sri Krishna College of Engineering and Technology, Coimbatore. Sri Krishna College of Engineering and Technology, Coimbatore.

Sri Krishna College of Engineering and Technology, Coimbatore. Sri Krishna College of Engineering and Technology, Coimbatore. ENERGY EFFICIENT COEXISTENCE PROTOCOL FOR COGNITIVE RADIONETWORKS 1 M.S.Rihana, 2 Mr.N.Sathish 1 PG Student, Department of ECE, Sri Krishna College of Engineering and Technology, Coimbatore. 2 Assistant

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

Cognitive Radios In TV White Spaces

Cognitive Radios In TV White Spaces Cognitive Radios In TV White Spaces Monisha Ghosh Philips Research North America November 2 nd, 2007 Outline White Spaces : what, why and when Cognitive Radio: applications to TV white spaces. Technical

More information

Mobile Network A9ack Evolu=on

Mobile Network A9ack Evolu=on Mobile Network A9ack Evolu=on Karsten Nohl Luca Mele9e SRLabs Template v12 Security research is successful if vulnerabili=es get removed Security researchers discover

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

NGN Security standards for Fixed-Mobile Convergence

NGN Security standards for Fixed-Mobile Convergence NGN Security standards for Fixed-Mobile Convergence Judith E. Y. Rossebø Telenor R&I ETSI TISPAN WG7 Chairman (judith.rossebo@telenor.com) 2nd ETSI Security Workshop: Future Security 16-17 - Sophia-Antipolis,

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

An Update on Security and Emergency Preparedness Standards for Utilities

An Update on Security and Emergency Preparedness Standards for Utilities An Update on Security and Emergency Preparedness Standards for Utilities Linda P. Warren, Launch! Consulting Safety and Security in the Workplace March 28, 2013 Overview 1 Review of AWWA Standards in Water

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

TV White Space as a Rule Based Expert System. : Eric Samikwa (Malawi)

TV White Space as a Rule Based Expert System. : Eric Samikwa (Malawi) TV White Space as a Rule Based Expert System Researcher Supervisor : Eric Samikwa (Malawi) : Dr Chomora Mikeka (Malawi) Background Protection of incumbent users from interference within their service area

More information

CRITICAL INFRASTRUCTURE PROTECTION

CRITICAL INFRASTRUCTURE PROTECTION CRITICAL INFRASTRUCTURE PROTECTION Cosmos Business Systems COSMOS BUSINESS SYSTEMS SA established in Greek & Cypriot market for more than 25 years dealing in all IT related projects in both Governmental

More information

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato 13th Florence Rail Forum: Cyber Security in Railways Systems Immacolata Lamberti Andrea Pepato November 25, 2016 Cyber Security context and Cyber Attacks trend Critical Infrastructures (CIs) are both physical

More information

Cognitive Radio Networks

Cognitive Radio Networks Cognitive Radio Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Cognitive Radio Technology Spectrum Sensing

More information

Using Game Theory to Model Resource Sharing in Future Wireless Networks

Using Game Theory to Model Resource Sharing in Future Wireless Networks Using Game Theory to Model Resource Sharing in Future Wireless Networks Luiz A. DaSilva Professor of Telecommunications CONNECT, Trinity College Dublin European Future of Wireless Technology Workshop Stockholm,

More information

Strengthening Cybersecurity Workforce Development December 2017

Strengthening Cybersecurity Workforce Development December 2017 Strengthening Cybersecurity Workforce Development December 2017 Agenda 1. Introduc3ons SANS GIAC Team 2. Goal: 2017 Execu3ve Order 3. SANS GIAC NICE Workforce Framework (NCWF) Mapping Overview 4. Workforce

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #6 Physical Layer Security 1 Leveraging PHY Properties Each wireless link behaves differently A single transmission looks different to each

More information

Mitigating Arc Flash Hazards

Mitigating Arc Flash Hazards 1910DB1402 / March, 2015 by Antony Parsons, Ph.D., P.E. and Reza Tajali, P.E. Schneider Electric Engineering Services Make the most of your energy SM Contents 1.0 Introduction... 3 2.0 What is Arc Flash

More information

60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan

60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan 60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan University of Wisconsin - Madison http://xyzhang.ece.wisc.edu

More information

Bridging the Gap Between Security and Modularity

Bridging the Gap Between Security and Modularity Bridging the Gap Between Security and Modularity Sponsor: DASD(SE) By Ms. Giselle M. Bonilla-Ortiz 6 th Annual SERC Doctoral Students Forum November 7, 2018 FHI 360 CONFERENCE CENTER 1825 Connecticut Avenue

More information

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure

More information

Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1

Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1 Sun Mgt Bonus Lab 2: Zone and DoS Protection on Palo Alto Networks Firewalls 1 Overview Denial of Service (DoS) and Distributed Denial of Service (DDoS) types of attack are attempts to disrupt network

More information

SECURITY RISK METRICS: THE VIEW FROM THE TRENCHES. Alain Mayer CTO, RedSeal Systems

SECURITY RISK METRICS: THE VIEW FROM THE TRENCHES. Alain Mayer CTO, RedSeal Systems SECURITY RISK METRICS: THE VIEW FROM THE TRENCHES Alain Mayer CTO, RedSeal Systems Alain@RedSeal.net Security Defects Defects Vulnerabilities on applications, OS, embedded systems Un-approved applications

More information

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2 Architectural Requirements Phase See Sommerville Chapters 11, 12, 13, 14, 18.2 1 Architectural Requirements Phase So7ware requirements concerned construc>on of a logical model Architectural requirements

More information

RTP Taxonomy & Rela.onships

RTP Taxonomy & Rela.onships RTP Taxonomy & Rela.onships dra%- lennox- raiarea- rtp- grouping- taxonomy- 03 IETF 88 @Authors 1 Changes Since - 02 Major re- write Sec.on 2, Concepts, re- structured to a conceptual media chain with

More information

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview

More information