• Title/Summary/Keyword: Eavesdropper

Search Result 64, Processing Time 0.024 seconds

Maximizing Secrecy Rate and Performance Analysis of Relay Selection for Cooperative Diversity Networks in Presence of an Eavesdropper (도청자가 존재하는 무선 협력 네트워크의 전달 단말 선택을 통한 보안 전송률 최대 전송기술 및 성능분석)

  • Ju, MinChul;Kwon, Tai-Gil;Cho, Jin-Woong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.533-540
    • /
    • 2015
  • We study relay selection in decode-and-forward (DF)-based relay networks consisting of a source, a destination, an eavesdropper, and multiple relays, where each terminal has a single antenna and operates in a half-duplex mode. In these networks, it is desirable to protect the confidential message from the source to the destination against the eavesdropper with the help of a single selected relay. Specifically, we begin by investigating DF-based networks for the scenario instantaneous signal-to-noise ratios (SNRs) related to the eavesdropper are available. For the scenario, we propose relay selection to maximize the secrecy rate of DF-based networks with and without direct-paths, and we derive the exact secrecy outage probabilities in closed-form.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

Robust Cooperative Relay Beamforming Design for Security

  • Gong, Xiangwu;Dong, Feihong;Li, Hongjun;Shao, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4483-4501
    • /
    • 2015
  • In this paper, we investigate a security transmission scheme at the physical layer for cooperative wireless relay networks in the presence of a passive eavesdropper. While the security scheme has been previously investigated with perfect channel state information(CSI) in the presence of a passive eavesdropper, this paper focuses on researching the robust cooperative relay beamforming mechanism for wireless relay networks which makes use of artificial noise (AN) to confuse the eavesdropper and increase its uncertainty about the source message. The transmit power used for AN is maximized to degrade the signal-to-interference-plus-noise-ratio (SINR) level at the eavesdropper, while satisfying the individual power constraint of each relay node and worst-case SINR constraint at the desired receiver under a bounded spherical region for the norm of the CSI error vector from the relays to the destination. Cooperative beamforming weight vector in the security scheme can be obtained by using S-Procedure and rank relaxation techniques. The benefit of the proposed scheme is showed in simulation results.

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

A Relay Selection Scheme for Network Security (네트워크 보안을 위한 중계기 선택 기법)

  • Lee, Byeong Su;Sung, Kil-Young;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2213-2218
    • /
    • 2016
  • In this paper, we propose a new relay selection scheme which can decrease the secrecy outage probability in a relay communication network with multiple relays and an eavesdropper. In the conventional relay selection scheme, a relay transmits jamming signal toward an eavesdropper to decrease the successful decoding probability of the eavesdropper. The coventional scheme has a critical problem that the successful decoding probability of a receiver also decreases. The new relay selection scheme proposed in this paper can significantly enhance the secrecy outage probability by selecting a pair of relays which can increase the successful decoding probability of the receiver while decreasing the successful decoding probability of the eavesdropper. We performed extensive computer simulation based on Monte-Carlo. The simulation results reveal that the proposed relay selection scheme can improve the secrecy outage probability by 10 to 50 times compared to the existing relay selection scheme.

Power Splitting-based Analog Network Coding for Improving Physical Layer Security in Energy Harvesting Networks (에너지 하베스팅 네트워크에서 물리계층 보안을 향상시키기 위한 파워 분할 기반의 아날로그 네트워크 코딩)

  • Lee, Kisong;Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1849-1854
    • /
    • 2017
  • Recently, RF energy harvesting, in which energy is collected from the external RF signals, is considered as a promising technology to resolve the energy shortage problem of wireless sensors. In addition, it is important to guarantee secure communication between sensors for implementing Internet-of-Things. In this paper, we propose a power splitting-based network analog coding for maximizing a physical layer security in 2-hop networks where the wireless-powered relay can harvest energy from the signals transmitted by two sources. We formulate systems where two sources, relay, and eavesdropper exist, and find an optimal power splitting ratio for maximizing the minimum required secrecy capacity using an exhaustive search. Through simulations under various environments, it is demonstrated that the proposed scheme improves the minimum required secrecy capacity by preventing the eavesdropper from overhearing source signals, compared to the conventional scheme.

Secrecy Performance of Secure Amplify-and-Forward Transmission with Multi-Antenna Relay (다중 안테나 릴레이 기반의 Secure Amplifyand-Forward 전송 시스템의 보안 성능 분석)

  • Hwang, Kyu-Sung;Ju, MinChul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.733-738
    • /
    • 2013
  • In this paper, we consider a physical layer security of an amplify-and-forward (AF) transmission in a presence of an eavesdropper in a wiretap channel. The proposed wiretap channel consists of a source, a destination, a relay, and an eavesdropper. Specifically, we consider that the relay has multiple antennas to exploit a diversity gain and a receive/transmit antenna selection schemes are applied to maximize a signal-to-noise ratio. In a practical point of view, we focus on the practical scenario where the relay does not have any channel state information of the eavesdropper while performing an AF protocol at the relay. For a secrecy performance analysis, we analyze a secrecy outage probability of the proposed system in one-integral form and verify our analysis with the computer-based simulation.

Information leakage in bi-directional IFD communication system with simultaneously transmitted jamming sequence

  • Ju, Hyungsik;Gwak, Donghyuk;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.138-149
    • /
    • 2020
  • In this paper, we describe a simultaneously transmitted jamming (ST-jamming) for bi-directional in-band full-duplex (IFD) system to improve information security at the physical layer. By exploiting ST-jamming, each legitimate user transmits data samples and jamming samples together in one orthogonal frequency division multiplexing symbol according to given traffic asymmetry. Regardless of the traffic difference in both directions in IFD communication, eavesdropping of confidential information is prevented in both directions simultaneously without the loss of data rate. We first propose an encoding scheme and the corresponding decoding scheme for ST-jamming to be used by the legitimate users. In addition, we study a transceiver structure of the legitimate users including a baseband modem uniquely designed for the use of ST-jamming. The leakage of confidential information at an eavesdropper is then quantified by studying the mutual information between the confidential transmit signals and the received signals of the eavesdropper. Simulation results show that the proposed ST-jamming significantly reduces the leakage of legitimate information at the eavesdropper.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Build-in Wiretap Channel I with Feedback and LDPC Codes

  • Wen, Hong;Gong, Guang;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.538-543
    • /
    • 2009
  • A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.