Eavesdropping Area for Evaluating the Security of Wireless Communications

被引:0
|
作者
Xiaofeng Zhong [1 ,2 ]
Chenchen Fan [1 ,2 ]
Shidong Zhou [1 ,2 ]
机构
[1] Tsinghua University Beijing National Research Center for Information Science and Technology
[2] Department of Electronic Engineering, Tsinghua University
关键词
D O I
暂无
中图分类号
TN92 [无线通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
Compared with wired communication, the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature. To prevent eavesdropping, many researches on transmission techniques or cryptographic methods are carried out. This paper proposes a new index parameter named as eavesdropping area, to evaluate the anti-eavesdropping performance of wireless system. Given the locations of legitimate transmitter and receiver, eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification. Corresponding key system parameters are analyzed, including the characteristics of eavesdropping region, transmitted beam pattern, beam direction, receiver sensitivity, eavesdropping sensitivity, path loss exponent and so on. The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability.
引用
收藏
页码:145 / 157
页数:13
相关论文
共 50 条
  • [31] Eavesdropping mitigation for wireless communications over single-input-single-output channels
    Li, Ming
    Liu, Qian
    IET COMMUNICATIONS, 2015, 9 (12) : 1493 - 1500
  • [32] Eavesdropping syndicates in cellular communications
    McKellips, A
    Verdi, S
    48TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-3, 1998, : 318 - 322
  • [33] Wireless Personal Communications special issue on Security for Next Generation Communications
    Anand Prasad
    James Kempf
    Wireless Personal Communications, 2003, 26 (2-3) : 283 - 284
  • [34] The Security of Wireless Local Area Network
    NAN Lin
    电脑知识与技术, 2007, (09) : 634 - 635
  • [35] Security Performance of Polar Codes in UV Wireless Communications
    Liang, Xuetong
    Zhang, Min
    Han, Dahai
    2018 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP), 2018,
  • [36] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [37] Achieving Capacity and Security in Wireless Communications With Lattice Codes
    Ling, Cong
    2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC), 2016, : 171 - 175
  • [38] On wireless communications privacy and security evaluation of encryption techniques
    Mihaljevic, MJ
    Kohno, R
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 865 - 868
  • [39] Wireless communications sensing and security above 100 GHz
    Jornet, Josep M.
    Knightly, Edward W.
    Mittleman, Daniel M.
    NATURE COMMUNICATIONS, 2023, 14 (01)
  • [40] Wireless communications sensing and security above 100 GHz
    Josep M. Jornet
    Edward W. Knightly
    Daniel M. Mittleman
    Nature Communications, 14