Eavesdropping predators, parasites and parasitoids exploit signals emitted by their prey and hosts for detection, assessment, localization and attack, and in the process impose strong selective pressures on the communication systems of the organisms they exploit. Signallers have evolved numerous anti‐eavesdropper strategies to mitigate the trade‐off between the costs imposed from signal exploitation and the need for conspecific communication. Eavesdropper strategies fall along a continuum from opportunistic to highly specialized, and the tightness of the eavesdropper–signaller relationship results in differential pressures on communication systems. A wide variety of anti‐eavesdropper strategies mitigate the trade‐off between eavesdropper exploitation and conspecific communication. Antagonistic selection from eavesdroppers can result in diverse outcomes including modulation of signalling displays, signal structure, and evolutionary loss or gain of a signal from a population. These strategies often result in reduced signal conspicuousness and in decreased signal ornamentation. Eavesdropping enemies, however, can also promote signal ornamentation. While less common, this alternative outcome offers a unique opportunity to dissect the factors that may lead to different evolutionary pathways. In addition, contrary to traditional assumptions, no sensory modality is completely ‘safe’ as eavesdroppers are ubiquitous and have a broad array of sensory filters that allow opportunity for signal exploitation. We discuss how anthropogenic change affects interactions between eavesdropping enemies and their victims as it rapidly modifies signalling environments and community composition. Drawing on diverse research from a range of taxa and sensory modalities, we synthesize current knowledge on anti‐eavesdropper strategies, discuss challenges in this field and highlight fruitful new directions for future research. Ultimately, this review offers a conceptual framework to understand the diverse strategies used by signallers to communicate under the pressure imposed by their eavesdropping enemies.
more » « less- Award ID(s):
- 2054636
- PAR ID:
- 10390524
- Publisher / Repository:
- Wiley-Blackwell
- Date Published:
- Journal Name:
- Biological Reviews
- Volume:
- 98
- Issue:
- 1
- ISSN:
- 1464-7931
- Page Range / eLocation ID:
- p. 222-242
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
Animals that rely on electrolocation and echolocation for navigation and prey detection benefit from sensory systems that operate in the dark, exploiting a sensory niche with few competitors. Active sensing can be described as a highly specialized form of communication, with the self as both sender and receiver of sensory information. However, the overlapping functions of active sensing as communication with the self and active sensing as communication with others creates challenges for signal privacy and fidelity by leaving active sensing animals vulnerable to eavesdropping, jamming, and noise. Here we present an overview of active sensing systems used by weakly electric fish, bats and odontocetes and consider their susceptibility to heterospecific and conspecific jamming signals and eavesdropping. Susceptibility to jamming signals by both conspecifics and prey animals reduces the efficacy of electrolocation and echolocation for prey capture and foraging. Likewise, active sensing signals may be eavesdropped, opening risk of predation or competition at productive foraging sites. The evolutionary success of these animals suggests that they effectively counter the costs of active sensing through rich and diverse adaptive behaviors that allow them to mitigate the effects of competition for signal space and the exploitation of their signals for social communication.more » « less
-
Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and corrupting the eavesdropper’s signal reception. These methods, albeit practical, have been proven vulnerable against multiantenna eavesdroppers who can filter the message from the noise. The venerability is rooted in the fact that the main channel state remains stasis in spite of the noise injection, which allows an eavesdropper to estimate it promptly via known symbols and filter out the noise. Our proposed scheme leverages a reconfigurable antenna for Alice to rapidly change the channel state during transmission and a compressive sensing based algorithm for her to predict and cancel the changing effects for Bob. As a result, the communication between Alice and Bob remains clear, whereas randomized channel state prevents Eve from launching the knownplaintext attack. We formally analyze the security of the scheme against both single and multi-antenna eavesdroppers and identify its unique anti-eavesdropping properties due to the artificially created fast changing channel. We conduct extensive simulations and real-world experiments to evaluate its performance. Empirical results show that our scheme can suppress Eve’s attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes.more » « less
-
Wireless telemetry communication systems may be vulnerable to eavesdroppers due to their broad- casting nature, which is a risk to confidential information transmission. This paper explores the feasibility of low-density parity-check (LDPC) codes for wiretap coding over a Gaussian channel for standard telemetry links. By introducing a wiretap LDPC coding method, we aim to mitigate the risk of eavesdropping. We further explore the notion of fine-tuning the trade-off in these codes between secrecy and reliability through artificial noise injection. Simulation results demonstrate the effectiveness of employing an LDPC-based wiretap code over telemetry links to provide se- crecy. The analysis of the code shows that a neural network-based mutual information estimator can be utilized to calculate information leakage over telemetry links.more » « less
-
null (Ed.)Considered is a multi-channel wireless network for secret communication that uses the signal-to-interference-plus-noise ratio (SINR) as the performance measure. An eavesdropper can intercept encoded messages through a degraded channel of each legitimate transmitter-receiver communication pair. A friendly interferer, on the other hand, may send cooperative jamming signals to enhance the secrecy performance of the whole network. Besides, the state information of the eavesdropping channel may not be known completely. The transmitters and the friendly interferer have to cooperatively decide on the optimal jamming power allocation strategy that balances the secrecy performance with the cost of employing intentional interference, while the eavesdropper tries to maximize her eavesdropping capacity. To solve this problem, we propose and analyze a non-zero-sum game between the network defender and the eavesdropper who can only attack a limited number of channels. We show that the Nash equilibrium strategies for the players are of threshold type. We present an algorithm to find the equilibrium strategy pair. Numerical examples demonstrate the equilibrium and contrast it to baseline strategies.more » « less
-
Male frogs court females from within crowded choruses, selecting for mechanisms allowing them to call at favourable times relative to the calls of rivals and background chorus noise. To accomplish this, males must continuously evaluate the fluctuating acoustic scene generated by their competitors for opportune times to call. Túngara frogs produce highly frequency- and amplitude-modulated calls from within dense choruses. We used similarly frequency- and amplitude-modulated playback tones to investigate the sensory basis of their call-timing decisions. Results revealed that different frequencies present throughout this species’ call differed in their degree of call inhibition, and that lower-amplitude tones were less inhibitory. Call-timing decisions were then driven by fluctuations in inhibition arising from underlying frequency- and amplitude-modulation patterns, with tone transitions that produced steeper decreases in inhibition having higher probabilities of triggering calls. Interactions between the varied behavioural sensitivities to different conspecific call frequencies revealed here, and the stereotyped amplitude- and frequency-modulation patterns present in this species’ calls, can explain previously surprising patterns observed in túngara frog choruses. This highlights the importance of understanding the specific sensory drivers underpinning conspecific signalling interactions, and reveals how sensory systems can mediate the interplay between signal perception and production to facilitate adaptive communication strategies.