Ozan Alp Topal, Mehmet Ozgun Demir, Guido Dartmann, A. Schmeink, G. Ascheid, A. E. Pusane, Günes Karabulut-Kurt
{"title":"Physical Layer Spoofing Against Eavesdropping Attacks","authors":"Ozan Alp Topal, Mehmet Ozgun Demir, Guido Dartmann, A. Schmeink, G. Ascheid, A. E. Pusane, Günes Karabulut-Kurt","doi":"10.1109/MECO.2019.8760168","DOIUrl":null,"url":null,"abstract":"In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal. We define the probability of spoofing an eavesdropper as the spoofing probability and obtain the closed form expression in presence of fading channels. We also obtain the spoofing rate and the spoofing probability under a selected communication rate requirement for Alice and Bob.","PeriodicalId":141324,"journal":{"name":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MECO.2019.8760168","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal. We define the probability of spoofing an eavesdropper as the spoofing probability and obtain the closed form expression in presence of fading channels. We also obtain the spoofing rate and the spoofing probability under a selected communication rate requirement for Alice and Bob.