skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Tactics of evasion: strategies used by signallers to deter eavesdropping enemies from exploiting communication systems
ABSTRACT Eavesdropping predators, parasites and parasitoids exploit signals emitted by their prey and hosts for detection, assessment, localization and attack, and in the process impose strong selective pressures on the communication systems of the organisms they exploit. Signallers have evolved numerous anti‐eavesdropper strategies to mitigate the trade‐off between the costs imposed from signal exploitation and the need for conspecific communication. Eavesdropper strategies fall along a continuum from opportunistic to highly specialized, and the tightness of the eavesdropper–signaller relationship results in differential pressures on communication systems. A wide variety of anti‐eavesdropper strategies mitigate the trade‐off between eavesdropper exploitation and conspecific communication. Antagonistic selection from eavesdroppers can result in diverse outcomes including modulation of signalling displays, signal structure, and evolutionary loss or gain of a signal from a population. These strategies often result in reduced signal conspicuousness and in decreased signal ornamentation. Eavesdropping enemies, however, can also promote signal ornamentation. While less common, this alternative outcome offers a unique opportunity to dissect the factors that may lead to different evolutionary pathways. In addition, contrary to traditional assumptions, no sensory modality is completely ‘safe’ as eavesdroppers are ubiquitous and have a broad array of sensory filters that allow opportunity for signal exploitation. We discuss how anthropogenic change affects interactions between eavesdropping enemies and their victims as it rapidly modifies signalling environments and community composition. Drawing on diverse research from a range of taxa and sensory modalities, we synthesize current knowledge on anti‐eavesdropper strategies, discuss challenges in this field and highlight fruitful new directions for future research. Ultimately, this review offers a conceptual framework to understand the diverse strategies used by signallers to communicate under the pressure imposed by their eavesdropping enemies.  more » « less
Award ID(s):
2054636
PAR ID:
10390524
Author(s) / Creator(s):
 ;  
Publisher / Repository:
Wiley-Blackwell
Date Published:
Journal Name:
Biological Reviews
Volume:
98
Issue:
1
ISSN:
1464-7931
Page Range / eLocation ID:
p. 222-242
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Animals that rely on electrolocation and echolocation for navigation and prey detection benefit from sensory systems that operate in the dark, exploiting a sensory niche with few competitors. Active sensing can be described as a highly specialized form of communication, with the self as both sender and receiver of sensory information. However, the overlapping functions of active sensing as communication with the self and active sensing as communication with others creates challenges for signal privacy and fidelity by leaving active sensing animals vulnerable to eavesdropping, jamming, and noise. Here we present an overview of active sensing systems used by weakly electric fish, bats and odontocetes and consider their susceptibility to heterospecific and conspecific jamming signals and eavesdropping. Susceptibility to jamming signals by both conspecifics and prey animals reduces the efficacy of electrolocation and echolocation for prey capture and foraging. Likewise, active sensing signals may be eavesdropped, opening risk of predation or competition at productive foraging sites. The evolutionary success of these animals suggests that they effectively counter the costs of active sensing through rich and diverse adaptive behaviors that allow them to mitigate the effects of competition for signal space and the exploitation of their signals for social communication. 
    more » « less
  2. Receivers of acoustic communication signals evaluate signal features to identify conspecifics. Changes in the ambient temperature can alter these features, rendering species recognition a challenge. To maintain effective communication, temperature coupling—changes in receiver signal preferences that parallel temperature-induced changes in signal parameters—occurs among genetically coupled signallers and receivers. Whether eavesdroppers of communication signals exhibit temperature coupling is unknown. Here, we investigate if the parasitoid flyOrmia ochracea, an eavesdropper of cricket calling songs, exhibits song pulse rate preferences that are temperature coupled. We use a high-speed treadmill system to record walking phonotaxis at three ambient temperatures (21, 25, and 30°C) in response to songs that varied in pulse rates (20 to 90 pulses per second). Total walking distance, peak steering velocity, angular heading, and the phonotaxis performance index varied with song pulse rates and ambient temperature. The peak of phonotaxis performance index preference functions became broader and shifted to higher pulse rate values at higher temperatures. Temperature-related changes in cricket songs between 21 and 30°C did not drastically affect the ability of flies to recognize cricket calling songs. These results confirm that temperature coupling can occur in eavesdroppers that are not genetically coupled with signallers. 
    more » « less
  3. Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and corrupting the eavesdropper’s signal reception. These methods, albeit practical, have been proven vulnerable against multiantenna eavesdroppers who can filter the message from the noise. The venerability is rooted in the fact that the main channel state remains stasis in spite of the noise injection, which allows an eavesdropper to estimate it promptly via known symbols and filter out the noise. Our proposed scheme leverages a reconfigurable antenna for Alice to rapidly change the channel state during transmission and a compressive sensing based algorithm for her to predict and cancel the changing effects for Bob. As a result, the communication between Alice and Bob remains clear, whereas randomized channel state prevents Eve from launching the knownplaintext attack. We formally analyze the security of the scheme against both single and multi-antenna eavesdroppers and identify its unique anti-eavesdropping properties due to the artificially created fast changing channel. We conduct extensive simulations and real-world experiments to evaluate its performance. Empirical results show that our scheme can suppress Eve’s attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes. 
    more » « less
  4. null (Ed.)
    Considered is a multi-channel wireless network for secret communication that uses the signal-to-interference-plus-noise ratio (SINR) as the performance measure. An eavesdropper can intercept encoded messages through a degraded channel of each legitimate transmitter-receiver communication pair. A friendly interferer, on the other hand, may send cooperative jamming signals to enhance the secrecy performance of the whole network. Besides, the state information of the eavesdropping channel may not be known completely. The transmitters and the friendly interferer have to cooperatively decide on the optimal jamming power allocation strategy that balances the secrecy performance with the cost of employing intentional interference, while the eavesdropper tries to maximize her eavesdropping capacity. To solve this problem, we propose and analyze a non-zero-sum game between the network defender and the eavesdropper who can only attack a limited number of channels. We show that the Nash equilibrium strategies for the players are of threshold type. We present an algorithm to find the equilibrium strategy pair. Numerical examples demonstrate the equilibrium and contrast it to baseline strategies. 
    more » « less
  5. For many animals, options abound when choosing a mate in socially complex environments like a breeding chorus or lek. In such environments, receivers often choose their mate based on individual differences in signal repetition rate. However, signallers also differ in the regularity with which they produce repeated signals. Irregularity in signalling introduces uncertainty in decision-making by masking the among-individual variation in signalling rate that is a target of mate choice. At present, we know little about how the complexity of the choice environment impacts selection on rate and regularity, two signalling behaviours that receivers can only compare after sampling series of signals produced by multiple signallers. In this study of female grey treefrogs (Hyla chrysoscelis), we measured multivariate sexual selection on the rate and regularity of male calling behaviour using two-, four-, and eight-choice tests. Receivers overwhelmingly chose faster, more regular calling rates in two-choice tests, but did so markedly less often when they chose among four or eight stimuli. Signalling behaviour became much less predictive of signallers’ relative fitness as choice complexity increased, suggesting noise and choice overload effects may shelter male phenotypes from sexual selection imposed by female choice in complex social environments. 
    more » « less