Title :
What are the roles of electronic and Cyber Warfare in cognitive radio security?
Author :
Scott, Andrea ; Hardy, T.J. ; Martin, Richard K. ; Thomas, R.W.
Author_Institution :
Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol. (AFIT), Wright-Patterson AFB, OH, USA
Abstract :
Traditionally, Electronic Warfare (EW) and Cyber Warfare (CW) have been viewed as independent, disparate disciplines. However, they are often trying to accomplish similar tasks, and thus may be viewed as two sides of the same coin. When both the attacher and defender employ cognitive techniques, the edge may go to the side that integrates techniques from both EW and CW. In this paper, we examine two case studies in radio security. We examine what happens when the attacker is cognitive, and consider cognitive EW/CW approaches to defend against the attacks.
Keywords :
cognitive radio; electronic warfare; telecommunication security; attacher; cognitive radio security; cognitive techniques; cyber warfare; defender; electronic warfare; Computer aided software engineering; Continuous wavelet transforms; Estimation; Irrigation; Jamming; OFDM; Receivers;
Conference_Titel :
Circuits and Systems (MWSCAS), 2011 IEEE 54th International Midwest Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-61284-856-3
Electronic_ISBN :
1548-3746
DOI :
10.1109/MWSCAS.2011.6026501