cogcom 14(1): e4

Research Article

Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise

Download1023 downloads
  • @ARTICLE{10.4108/cogcom.1.1.e4,
        author={Dan Shan and Kai Zeng and Weidong Xiang and Paul Richardson},
        title={Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise},
        journal={EAI Endorsed Transactions on Cognitive Communications},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={COGCOM},
        year={2014},
        month={7},
        keywords={CRN, WMUE, MCWM, FM demodulator},
        doi={10.4108/cogcom.1.1.e4}
    }
    
  • Dan Shan
    Kai Zeng
    Weidong Xiang
    Paul Richardson
    Year: 2014
    Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise
    COGCOM
    ICST
    DOI: 10.4108/cogcom.1.1.e4
Dan Shan1, Kai Zeng1,*, Weidong Xiang1, Paul Richardson1
  • 1: 4901 Evergreen Rd, Dearborn, MI, USA, 48092
*Contact email: kzeng@umich.edu

Abstract

Cognitive radio networks (CRNs) are susceptible to primary user emulation (PUE) attacks. Conventional PUE attack detection approaches consider television broadcasting as the primary user. In this work, however, we study a special kind of PUE attack named wireless microphone user emulation (WMUE) attack. Existing work on WMUE attack detection deals with single channel senario. Although multi-channelWM(MCWM) systems are common, detecting WMUE attacks under a multi-channel setting in noisy environments has not been well studied. In this work, we propose a novelmulti-channelWMUEattack detection scheme which operates in low signal-to-noise ratio (SNR) environments with low computational complexity, thanks to the first 1.5-bit FM demodulator whose outputs are represented by only 0, 1 and -1. Experimental results show that, the proposed scheme can effectively detect multi-channel WMUE attacks within 0.25 second when SNR is lower than 6 dB.