Spectrum Vulnerabilities - Part II : Recommendations for Identifying and Understanding Spectrum Vulnerabilities

Chris Laughlin
{"title":"Spectrum Vulnerabilities - Part II : Recommendations for Identifying and Understanding Spectrum Vulnerabilities","authors":"Chris Laughlin","doi":"10.1109/miot.2020.9063396","DOIUrl":null,"url":null,"abstract":"Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet Things Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/miot.2020.9063396","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Exploited spectrum vulnerabilities can result in a range of consequences. At their most inconsequential, they may disrupt an individual or small group from communicating. More significantly, they can facilitate large-scale disruptions to communications, resulting in social, economic, and perhaps even unintended physical harm. At their worst, spectrum vulnerabilities can be used to cause intentional physical injuries. For example, individual and small-scale bad actors could use GPS spoofing to direct a person into harm’s way, disrupt vehicle-to-vehicle communications to cause accidents, or hack automated medical devices, such as insulin pumps or heart defibrillators, with fatal results. In a military setting, techniques like spectral herding can force enemies to communicate on chosen spectrum bands with greater vulnerabilities that can then be used to locate targets or send conflicting communications, as is thought to have occurred to Ukrainian forces during Russia’s 2014 annexation of Crimea. Despite these risks, most spectrum vulnerabilities remain unaddressed. In Part I of this column, I discussed the systematic and technological challenges to identifying and understanding spectrum vulnerabilities. These challenges were identified at a roundtable discussion convened by Silicon Flatirons, which included experts from government, academia, and industry. I was permitted to report on conclusions reached from the discussion. In Part II, I reveal some of the solutions offered by the roundtable participants to the challenges they identified. These solutions are a starting point, they are not fully developed, nor do they fully address each challenge. Nevertheless, I take a similar approach to presenting the solutions as I did in Part I, beginning with those that address systematic challenges and concluding with those that address technological challenges.1
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
频谱漏洞-第二部分:识别和理解频谱漏洞的建议
利用频谱漏洞可能导致一系列后果。在最无关紧要的情况下,它们可能会干扰个人或小组的交流。更重要的是,它们可能导致大规模的通信中断,造成社会、经济甚至意外的人身伤害。在最糟糕的情况下,频谱漏洞可能被用来造成故意的身体伤害。例如,个人和小规模的不法分子可以利用GPS欺骗将人引向危险的道路,破坏车对车的通信造成事故,或者侵入胰岛素泵或心脏除颤器等自动化医疗设备,造成致命的后果。在军事环境中,像频谱放牧这样的技术可以迫使敌人在选定的频谱频段上进行通信,这些频段的脆弱性更大,然后可以用来定位目标或发送相互冲突的通信,就像2014年俄罗斯吞并克里米亚期间乌克兰军队所发生的那样。尽管存在这些风险,但大多数频谱漏洞仍未得到解决。在本专栏的第一部分中,我讨论了识别和理解频谱漏洞的系统和技术挑战。在Silicon flatiron召集的圆桌讨论会上,来自政府、学术界和工业界的专家确定了这些挑战。我获准就讨论得出的结论作报告。在第二部分中,我将揭示圆桌会议参与者针对他们确定的挑战提出的一些解决方案。这些解决方案只是一个起点,它们还没有完全开发出来,也没有完全解决每一个挑战。尽管如此,我还是采用了与第一部分类似的方法来呈现解决方案,从解决系统挑战的方法开始,以解决技术挑战的方法结束
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Internet of Things Magazine: Updates on New Initiatives and Editorial Board Mentor's Musings on Concerns, Challenges & Opportunities for Generative AI at the Edge in IoT Mentor's Musings on the Role of Standards in Improving the Privacy, Trust and Reputation Management in Internet of Vehicles (IoV) New Initiatives and Updates for IEEE Internet of Things Magazine The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1