The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2013 vol.12)
pp: 401-411
Shaxun Chen , Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA
Kai Zeng , Dept. of Comput. & Inf. Sci., Univ. of Michigan-Dearborn, Dearborn, MI, USA
Prasant Mohapatra , Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA
ABSTRACT
In cognitive radio networks, an attacker transmits signals mimicking the characteristics of primary signals, in order to prevent secondary users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and wireless microphones are two main types of primary users in white space. Existing work on PUE attack detection only focused on the first category. For the latter category, primary users are mobile and their transmission power is low. These properties introduce great challenges on PUE detection and existing methods are not applicable. In this paper, we propose a novel method to detect the emulation attack of wireless microphones. We exploit the relationship between RF signals and acoustic information to verify the existence of wireless microphones. The effectiveness of our approach is validated through real-world implementation. Extensive experiments show that our method achieves both false positive rate and false negative rate lower than 0.1 even in a noisy environment.
INDEX TERMS
telecommunication security, cognitive radio, microphones, signal detection, acoustic information, wireless microphone emulation attacks detection, white space, cognitive radio networks, secondary users, primary user emulation attack, TV towers, wireless microphones, PUE attack detection, transmission power, PUE detection, RF signals, Microphones, Wireless communication, Wireless sensor networks, Emulation, Frequency modulation, Acoustics, TV, white space, Primary user emulation attack, cognitive radio, wireless microphone
CITATION
Shaxun Chen, Kai Zeng, Prasant Mohapatra, "Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space", IEEE Transactions on Mobile Computing, vol.12, no. 3, pp. 401-411, March 2013, doi:10.1109/TMC.2011.272
REFERENCES
[1] R. Chen and J.M. Park, "Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks," Proc. IEEE Workshop Networking Technology for Software Defined Radio Networks, pp. 110-119, Sept. 2006.
[2] Federal Communications Commission, "Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Spectrum Agile Radio Technologies," ET Docket Nos. 03-108, Dec. 2003.
[3] R. Chen, J.M. Park, and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Selected Areas in Comm., vol. 26, no. 1, pp. 25-37, Jan. 2008.
[4] R. Chen, J.M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Proc. IEEE INFOCOM, pp. 1876-1884, Apr. 2008.
[5] Z. Jin, S. Anand, and K.P. Subbalakshmi, "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks," Proc. IEEE Int'l Conf. Comm. (ICC), June 2009.
[6] Z. Jin, S. Anand, and K.P. Subbalakshmi, "Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks Using Hypothesis Testing," Proc. ACM Mobile Computing and Comm. Rev., 2009.
[7] IEEE Standard 802.22-09/0068r1, Sensing Performance with the 802.22.1 Wireless Microphone Beacon, IEEE, Mar. 2009.
[8] Z. Lei and F. Chin, "A Reliable and Power Efficient Beacon Structure for Cognitive Radio Systems," Proc. IEEE Int'l Conf. Comm. (ICC), May 2008.
[9] I.F. Akyildiz, W. Lee, M.C. Vuran, and S. Mohanty, "Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Network: A Survey," Computer Network, vol. 50, pp. 2127-2159, 2006.
[10] D. Cabric, S.M. Mishra, and R.W. Brodersen, "Implementation Issues in Spectrum Sensing for Cognitive Radios," Proc. Asilomar Conf. Signals, Systems and Computers, vol. 1, pp. 772-776, Nov. 2004.
[11] A. Ghasemi and E.S. Sousa, "Collaborative Spectrum Sensing for Opportunistic Access in Fading Environments," Proc. IEEE Int'l Symp. New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Nov. 2005.
[12] A.W. Min, X. Zhang, and K.G. Shin, "Spatio-Temporal Fusion for Small-Scale Primary Detection in Cognitive Radio Networks," Proc. IEEE INFOCOM, Mar. 2010.
[13] E. Reihl, "Wireless Microphone Characteristics," IEEE 802.22-06/0070r0, May 2006.
[14] M.J. Ryan and M. Frater, Communications and Information Systems. Argos, 2002.
[15] D. Giuliani, M. Omologo, and P. Svaizer, "Experiments of Speech Recognition in a Noisy and Reverberant Environment Using a Microphone Array and HMM Adaptation," Proc. Int'l Conf. Spoken Language (ICSLP), pp. 1329-1332, Oct. 1996.
[16] T. Yamada, S. Nakamura, and K. Shikano, "Simultaneous Recognition of Multiple Sound Sources Based on 3-D n-Best Search Using Microphone Array," Proc. Eurospeech Conf., vol. 1, pp. 69-72, Sept. 1999.
[17] M. Omologo and P. Svaizer, "Acoustic Source Location in Noisy and Reverberant Environment Using CSP Analysis," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP), pp. 921-924, 1996.
[18] S. Chen, K. Zeng, and P. Mohapatra, "Hearing Is Believing: Detecting Mobile Primary User Emulation Attack in White Space," Proc. IEEE INFOCOM, 2011.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool