8th International Conference on Cognitive Radio Oriented Wireless Networks 2013
DOI: 10.1109/crowncom.2013.6636810
|View full text |Cite
|
Sign up to set email alerts
|

Detecting multi-channel wireless microphone user emulation attacks in white space with noise

Abstract: Abstract-In this work, we study a special kind of primary user emulation (PUE) attack, named wireless microphone user emulation (WMUE) attack in white space cognitive radio networks. In WMUE attacks, a malicious user emulates wireless microphone (WM) signals in order to block secondary users. Existing work on WMUE attack detection deals with single channel senario. Although multi-channel WM (MCWM) systems are common, detecting WMUE attacks under a multi-channel setting in noisy environments has not been well s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…In the work of Chen and Park, the authors used the distance ratio test (DRT) and the distance different test (DDT) to authenticate the primary users identity. In the work of Shan et al, the authors presented a detection scheme for the wireless microphone user emulation (WMUE) attack (a particular kind of PUE attack), which uses the cross‐correlation between the acoustic signal and demodulated FM signal in the cognitive radio network. In the work of Yu et al, a two‐level database‐assisted detection approach was proposed.…”
Section: Introductionmentioning
confidence: 99%
“…In the work of Chen and Park, the authors used the distance ratio test (DRT) and the distance different test (DDT) to authenticate the primary users identity. In the work of Shan et al, the authors presented a detection scheme for the wireless microphone user emulation (WMUE) attack (a particular kind of PUE attack), which uses the cross‐correlation between the acoustic signal and demodulated FM signal in the cognitive radio network. In the work of Yu et al, a two‐level database‐assisted detection approach was proposed.…”
Section: Introductionmentioning
confidence: 99%