skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks
Due to the open nature of wireless medium, wireless communications are especially vulnerable to eavesdropping attacks. This paper designs a new wireless communication system to deal with eavesdropping attacks. The proposed system can enable a legitimate receiver to get desired messages and meanwhile an eavesdropper to hear ``fake" but meaningful messages by combining confidentiality and deception, thereby confusing the eavesdropper and achieving additional concealment that further protects exchanged messages. Towards this goal, we propose techniques that can conceal exchanged messages by utilizing wireless channel characteristics between the transmitter and the receiver, as well as techniques that can attract an eavesdropper to gradually approach a trap region, where the eavesdropper can get fake messages. We also provide both theoretical and empirical analysis of the established secure channel between the transmitter and the receiver. We develop a prototype system using Universal Software Defined Radio Peripherals (USRPs)Experimental results show that an eavesdropper at a trap location can receive fake information with a bit error rate (BER) close to 0, and the transmitter with multiple antennas can successfully deploy a trap area.  more » « less
Award ID(s):
1948547
PAR ID:
10313147
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
IEEE Transactions on Dependable and Secure Computing
ISSN:
1545-5971
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Considered is a multi-channel wireless network for secret communication that uses the signal-to-interference-plus-noise ratio (SINR) as the performance measure. An eavesdropper can intercept encoded messages through a degraded channel of each legitimate transmitter-receiver communication pair. A friendly interferer, on the other hand, may send cooperative jamming signals to enhance the secrecy performance of the whole network. Besides, the state information of the eavesdropping channel may not be known completely. The transmitters and the friendly interferer have to cooperatively decide on the optimal jamming power allocation strategy that balances the secrecy performance with the cost of employing intentional interference, while the eavesdropper tries to maximize her eavesdropping capacity. To solve this problem, we propose and analyze a non-zero-sum game between the network defender and the eavesdropper who can only attack a limited number of channels. We show that the Nash equilibrium strategies for the players are of threshold type. We present an algorithm to find the equilibrium strategy pair. Numerical examples demonstrate the equilibrium and contrast it to baseline strategies. 
    more » « less
  2. Filipe, J.; Ghosh, A.; Prates, R. O.; Zhou, L. (Ed.)
    This paper considers a parallel wireless network in which multiple individuals exchange confidential information through independent sender-receiver links. An eavesdropper can intercept encrypted information through a degraded channel of each sender-receiver link. A friendly jammer, by applying interference to the eavesdropping channels, can increase the level of secrecy of the network. The optimal power allocation strategy of the friendly jammer under a power constraint is derived. A convex optimization model is used when all channels are under the threat of an eavesdropping attack and a non-zero sum game model is analyzed when the eavesdropper can only attack a limited quantity of channels. 
    more » « less
  3. In this work, we propose a new approach to examine the joint effect of physical layer security (PhySec) and encryption. Our idea relies on the concept of rate-equivocation regions and can be used to study the tradeoff between encryption strength, allowed leakage, and transmission rate. By considering encryption, it is possible to achieve transmission rates beyond the secrecy capacity that is achievable by conventional physical layer security. Toward our goal, we exploit the fact that cryptography undermines the ability of the eavesdropper to access the plaintext. We then relax the design of physical layer security schemes without compromising the security of the system. To validate our new approach, we consider a multi-node Gaussian wiretap channel consisting of a legitimate transmitter, a legitimate receiver, an eavesdropper and multiple trusted relays assisting transmission from the transmitter to the receiver. Under this wireless network, we illustrate that encryption awareness not only complements traditional PhySec methods but also achieves superior secrecy performance. An encryption-aware secrecy capacity was also obtained from the rate-equivocation regions under different channel state information conditions. 
    more » « less
  4. Data security plays a crucial role in all areas of data transmission, processing, and storage. This paper considers security in eavesdropping attacks over wireless communication links in aeronautical telemetry systems. Data streams in these systems are often encrypted by traditional encryption algorithms such as the Advanced Encryption Standard (AES). Here, we propose a secure coding technique for the integrated Network Enhanced Telemetry (iNET) communications system that can be coupled with modern encryption schemes. We consider a wiretap scenario where there are two telemetry links between a test article (TA) and a legitimate receiver, or ground station (GS). We show how these two links can be used to transmit both encrypted and unencrypted data streams while keeping both streams secure. A single eavesdropper is assumed who can tap into both links through its noisy channel. Since our scheme does not require encryption of the unencrypted data stream, the proposed scheme offers the ability to reduce the size of the required secret key while keeping the transmitted data secure. 
    more » « less
  5. Chaotic antenna array (CAA)s are phased antenna arrays in which individual elements are randomized in their array position, shape, and feed line length. These randomizations generate spatially dependent large scale phase errors (with respect to antenna elements of a uniform array) that enables distinct physical layer security solutions not available to other wireless systems. Herein, a preliminary study on one such novel method, developed to combat eavesdropping is presented. In the proposed method, the CAA equipped transmitter intentionally distorts its signals based on its own array factor (AF) which includes the phase errors. This distortion significantly hampers demodulation at an eavesdropper, while a legitimate receiver that is aware of the phase errors can compensate for the added distortion. 
    more » « less