Skip to main content
Erschienen in: Wireless Networks 2/2017

22.12.2015

Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas

verfasst von: Meejoung Kim, Eenjun Hwang, Jeong-Nyeo Kim

Erschienen in: Wireless Networks | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper explores the benefits of using directional antennas in an eavesdropping attack in millimeter-wave (mmWave)-based wireless personal area networks (WPANs) and the security enhancement of mmWaves. The detection and protection probabilities are analyzed for the eavesdropper’s and transmitter’s perspectives, respectively. The analysis is based on the probability density function of distance between devices (DEVs), the exposure region, and the interference free (limited) exposure region of a DEV. Four cases, in which all target DEVs and an eavesdropper are equipped with either a directional antenna or an omni-directional antenna, are considered in a single-hop and a multi-hop communications. The expected lower bound of an eavesdropper’s detection probability and the relative detection rate are presented. Numerical results show that there exists a number of DEVs such that an eavesdropper can detect DEVs maximally. The detection probability tends to zero in a single-hop case, while it is saturated in a multi-hop case, as the number of DEVs increases. A DEV can communicate safely in one hop, while the communication is not secure anymore after several hops. Based on these results, we can conclude that the use of a directional antenna enables the better protection from an eavesdropping attack in mmWave-band communication and mmWave band can improve the security in communication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Giannetti, R., Luise, M., & Reggiannini, R. (1999). Mobile and personal communications in the 60 GHz band: A survey. Wireless Personal Commununications, 10(2), 207–243.CrossRef Giannetti, R., Luise, M., & Reggiannini, R. (1999). Mobile and personal communications in the 60 GHz band: A survey. Wireless Personal Commununications, 10(2), 207–243.CrossRef
2.
Zurück zum Zitat Rendevski, N., & Cassioli, D. (2013). UWB and mmWave communication techniques and systems for healthcare. In M. R. Yuce (Ed.), Ultra-wideband and 60 GHz communications for biomedical applications (pp. 1–22). New York, NY: Springer. Rendevski, N., & Cassioli, D. (2013). UWB and mmWave communication techniques and systems for healthcare. In M. R. Yuce (Ed.), Ultra-wideband and 60 GHz communications for biomedical applications (pp. 1–22). New York, NY: Springer.
4.
Zurück zum Zitat Rout, D. K., & Das, S. (2014). Interference mitigation in wireless body area networks using modified and modulated MHP. Wireless Personal Communications, 77(2), 1343–1361.CrossRef Rout, D. K., & Das, S. (2014). Interference mitigation in wireless body area networks using modified and modulated MHP. Wireless Personal Communications, 77(2), 1343–1361.CrossRef
5.
Zurück zum Zitat IEEE P802.15.3c/D08. (2009). IEEE 802 Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs). Amendment 2: Millimeter-wave based alternative physical layer extension, June 2009. IEEE P802.15.3c/D08. (2009). IEEE 802 Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs). Amendment 2: Millimeter-wave based alternative physical layer extension, June 2009.
6.
Zurück zum Zitat IEEE P802.11ad/D1.0. (2010). Part 11: Wireless LAN medium access control 5 (MAC) and physical layer (PHY) specifications amendment 5: 6 enhancements for very high throughput in the 60GHz band, September 2010. IEEE P802.11ad/D1.0. (2010). Part 11: Wireless LAN medium access control 5 (MAC) and physical layer (PHY) specifications amendment 5: 6 enhancements for very high throughput in the 60GHz band, September 2010.
7.
Zurück zum Zitat Standard ECMA-387. (2008). High rate 60GHz PHY, MAC and HDMI PAL, December 2008. Standard ECMA-387. (2008). High rate 60GHz PHY, MAC and HDMI PAL, December 2008.
8.
Zurück zum Zitat Sun, Z., & Lu, J. (2003). Improving the security performance in mobile wireless computing network using smart directional antenna. In Proceedings of CEEM (pp. 47–50). Sun, Z., & Lu, J. (2003). Improving the security performance in mobile wireless computing network using smart directional antenna. In Proceedings of CEEM (pp. 47–50).
9.
Zurück zum Zitat Kannan, P. M., Swaminathan, R., & Palanisamy, V. (2009). Enhancing WLAN security with sectored antennas. In Proceedings of ICUMT (pp. 1–5). Kannan, P. M., Swaminathan, R., & Palanisamy, V. (2009). Enhancing WLAN security with sectored antennas. In Proceedings of ICUMT (pp. 1–5).
10.
Zurück zum Zitat Lu, X., Towsley, D., Lio, P., Wicker, F., & Xiong, Z. (2009). Minimizing detection probability routing in ad hoc networks using directional antennas. EURASIP Journal of Wireless Communications and Networking. doi:10.1155/2009/256714. Lu, X., Towsley, D., Lio, P., Wicker, F., & Xiong, Z. (2009). Minimizing detection probability routing in ad hoc networks using directional antennas. EURASIP Journal of Wireless Communications and Networking. doi:10.​1155/​2009/​256714.
11.
Zurück zum Zitat Dai, H.-N., Li, D., & Wong, R. C.-W. (2011). Exploring security improvement of wireless networks with directional antennas. In Proceedings of LCN (pp. 191–194). Dai, H.-N., Li, D., & Wong, R. C.-W. (2011). Exploring security improvement of wireless networks with directional antennas. In Proceedings of LCN (pp. 191–194).
12.
Zurück zum Zitat Dai, H.-N., Wang Q., Li, D., & Wong, R. C.-W. (2013). On eavesdropping attacks in wireless sensor networks with directional antennas. International Journal of Distributed Sensor Networks, article ID 760834. Dai, H.-N., Wang Q., Li, D., & Wong, R. C.-W. (2013). On eavesdropping attacks in wireless sensor networks with directional antennas. International Journal of Distributed Sensor Networks, article ID 760834.
13.
Zurück zum Zitat Pongaliur, K., & Xiao, L. (2011). Maintaining source privacy under eavesdropping and node compromise attacks. In Proceedings of INFOCOM (pp. 1656–1664). Pongaliur, K., & Xiao, L. (2011). Maintaining source privacy under eavesdropping and node compromise attacks. In Proceedings of INFOCOM (pp. 1656–1664).
14.
Zurück zum Zitat Goel, S., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631). Goel, S., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631).
15.
Zurück zum Zitat Zhou, X., Ganti, R. K., & Andrews, J. G. (2011). Secure wireless network connectivity with multi-antenna transmission. IEEE Transactions on Wireless Communications, 10(2), 425–430.CrossRef Zhou, X., Ganti, R. K., & Andrews, J. G. (2011). Secure wireless network connectivity with multi-antenna transmission. IEEE Transactions on Wireless Communications, 10(2), 425–430.CrossRef
16.
Zurück zum Zitat Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33). Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33).
17.
Zurück zum Zitat Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang C. F., & Wang, Q. (2014). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science. Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang C. F., & Wang, Q. (2014). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science.
18.
Zurück zum Zitat Garnaev, A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, vol. 8715 of Lecture Notes of Computer Science (pp. 121–136). Garnaev, A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, vol. 8715 of Lecture Notes of Computer Science (pp. 121–136).
19.
Zurück zum Zitat Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., George, K., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., George, K., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.CrossRef
20.
Zurück zum Zitat Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. thesis, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA. Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. thesis, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA.
21.
Zurück zum Zitat Garnaev, A., Baykal-Gursoy, M., & Poor, H. V. (2014). Incorporating attack type uncertainty into network protection. IEEE Transactions on Information Forensics and Security, 9, 1278–1287.CrossRef Garnaev, A., Baykal-Gursoy, M., & Poor, H. V. (2014). Incorporating attack type uncertainty into network protection. IEEE Transactions on Information Forensics and Security, 9, 1278–1287.CrossRef
22.
Zurück zum Zitat Mukherjee A., & Swindlehurst, A. L. (2010). Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In Proceedings of MILCOM (pp. 1695–1700). Mukherjee A., & Swindlehurst, A. L. (2010). Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In Proceedings of MILCOM (pp. 1695–1700).
23.
Zurück zum Zitat Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Process, 61(1), 82–91.MathSciNetCrossRef Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Process, 61(1), 82–91.MathSciNetCrossRef
24.
Zurück zum Zitat Cai, L. X., Cai, L., Shen, X., & Mark, J. W. (2010). REX: A randomized exclusive region based scheduling scheme for mmWave WPANs with directional antenna. IEEE Transactions on Wireless Communications, 9(1), 113–121.CrossRef Cai, L. X., Cai, L., Shen, X., & Mark, J. W. (2010). REX: A randomized exclusive region based scheduling scheme for mmWave WPANs with directional antenna. IEEE Transactions on Wireless Communications, 9(1), 113–121.CrossRef
25.
Zurück zum Zitat Kim, M., Kim, Y., & Lee, Y. (2014). Resource allocation scheme for millimeter wave-based WPANs using directional antennas. ETRI Journal, 36(3), 385–395.CrossRef Kim, M., Kim, Y., & Lee, Y. (2014). Resource allocation scheme for millimeter wave-based WPANs using directional antennas. ETRI Journal, 36(3), 385–395.CrossRef
26.
Zurück zum Zitat Kim, M., Hong, S.-E., & Kim, J. (2012). Analysis of directional communication via relaying devices in mmWave WPANs. IEEE Communication Letters, 16(5), 342–345. Kim, M., Hong, S.-E., & Kim, J. (2012). Analysis of directional communication via relaying devices in mmWave WPANs. IEEE Communication Letters, 16(5), 342–345.
27.
Zurück zum Zitat Kim, M., Hong, S.-E., Kim, Y., & Kim, J. (2013). Analysis of resource assignment for directional multi-hop communications in mm-Wave WPANs. ETRI Journal, 35(1), 120–130.CrossRef Kim, M., Hong, S.-E., Kim, Y., & Kim, J. (2013). Analysis of resource assignment for directional multi-hop communications in mm-Wave WPANs. ETRI Journal, 35(1), 120–130.CrossRef
28.
Zurück zum Zitat Kim, M., Kim, Y. S., & Lee, W. (2012). Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments. ETRI Journal, 34(1), 24–34.CrossRef Kim, M., Kim, Y. S., & Lee, W. (2012). Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments. ETRI Journal, 34(1), 24–34.CrossRef
29.
Zurück zum Zitat Kim, M., & Lee, Y. (2013). Optimal contention window size for IEEE 802.15.3c mmWave WPANs. Wireless Networks, 20(6), 1335–1347.CrossRef Kim, M., & Lee, Y. (2013). Optimal contention window size for IEEE 802.15.3c mmWave WPANs. Wireless Networks, 20(6), 1335–1347.CrossRef
30.
Zurück zum Zitat Kim, M. (2015). Multi-hop communications in directional CSMA/CA over mmWave WPANs. Wireless Communications and Mobile Computing. doi:10.1002/wcm.2566. Kim, M. (2015). Multi-hop communications in directional CSMA/CA over mmWave WPANs. Wireless Communications and Mobile Computing. doi:10.​1002/​wcm.​2566.
31.
Zurück zum Zitat Kim, M., Kim, Y. S., & Lee, Y. (2013). Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks. IET Networks, 2(2), 92–102.MathSciNetCrossRef Kim, M., Kim, Y. S., & Lee, Y. (2013). Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks. IET Networks, 2(2), 92–102.MathSciNetCrossRef
32.
Zurück zum Zitat Khan, S., & Pathan, A.-S. K. (2013). Wireless networks and security issues, challenges and research trends. Heidelberg: Springer.CrossRef Khan, S., & Pathan, A.-S. K. (2013). Wireless networks and security issues, challenges and research trends. Heidelberg: Springer.CrossRef
33.
Zurück zum Zitat Yi, S., Pei, Y., & Kalyanaraman, S. (2003). On the capacity improvement of ad hoc wireless networks using directional antennas. In Proceedings of MobiHoc (pp. 108–116). Yi, S., Pei, Y., & Kalyanaraman, S. (2003). On the capacity improvement of ad hoc wireless networks using directional antennas. In Proceedings of MobiHoc (pp. 108–116).
Metadaten
Titel
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas
verfasst von
Meejoung Kim
Eenjun Hwang
Jeong-Nyeo Kim
Publikationsdatum
22.12.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1160-4

Weitere Artikel der Ausgabe 2/2017

Wireless Networks 2/2017 Zur Ausgabe

Neuer Inhalt