Research Article
Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise
@ARTICLE{10.4108/cogcom.1.1.e4, author={Dan Shan and Kai Zeng and Weidong Xiang and Paul Richardson}, title={Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise}, journal={EAI Endorsed Transactions on Cognitive Communications}, volume={1}, number={1}, publisher={ICST}, journal_a={COGCOM}, year={2014}, month={7}, keywords={CRN, WMUE, MCWM, FM demodulator}, doi={10.4108/cogcom.1.1.e4} }
- Dan Shan
Kai Zeng
Weidong Xiang
Paul Richardson
Year: 2014
Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise
COGCOM
ICST
DOI: 10.4108/cogcom.1.1.e4
Abstract
Cognitive radio networks (CRNs) are susceptible to primary user emulation (PUE) attacks. Conventional PUE attack detection approaches consider television broadcasting as the primary user. In this work, however, we study a special kind of PUE attack named wireless microphone user emulation (WMUE) attack. Existing work on WMUE attack detection deals with single channel senario. Although multi-channelWM(MCWM) systems are common, detecting WMUE attacks under a multi-channel setting in noisy environments has not been well studied. In this work, we propose a novelmulti-channelWMUEattack detection scheme which operates in low signal-to-noise ratio (SNR) environments with low computational complexity, thanks to the first 1.5-bit FM demodulator whose outputs are represented by only 0, 1 and -1. Experimental results show that, the proposed scheme can effectively detect multi-channel WMUE attacks within 0.25 second when SNR is lower than 6 dB.
Copyright © 2014 D. Shan et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.