Issue No. 03 - March (2013 vol. 12)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2011.272
Shaxun Chen , Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA
Kai Zeng , Dept. of Comput. & Inf. Sci., Univ. of Michigan-Dearborn, Dearborn, MI, USA
Prasant Mohapatra , Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA
In cognitive radio networks, an attacker transmits signals mimicking the characteristics of primary signals, in order to prevent secondary users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and wireless microphones are two main types of primary users in white space. Existing work on PUE attack detection only focused on the first category. For the latter category, primary users are mobile and their transmission power is low. These properties introduce great challenges on PUE detection and existing methods are not applicable. In this paper, we propose a novel method to detect the emulation attack of wireless microphones. We exploit the relationship between RF signals and acoustic information to verify the existence of wireless microphones. The effectiveness of our approach is validated through real-world implementation. Extensive experiments show that our method achieves both false positive rate and false negative rate lower than 0.1 even in a noisy environment.
telecommunication security, cognitive radio, microphones, signal detection, acoustic information, wireless microphone emulation attacks detection, white space, cognitive radio networks, secondary users, primary user emulation attack, TV towers, wireless microphones, PUE attack detection, transmission power, PUE detection, RF signals, Microphones, Wireless communication, Wireless sensor networks, Emulation, Frequency modulation, Acoustics, TV, white space, Primary user emulation attack, cognitive radio, wireless microphone
Kai Zeng, Shaxun Chen and P. Mohapatra, "Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space," in IEEE Transactions on Mobile Computing, vol. 12, no. , pp. 401-411, 2013.