Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020922
Hyojin Lee, Wanjik Kim, Joonhyuk Kang
Millimeter wave (mmWave) communication is considered as a promising technology for future wireless communication systems. Since a radio-frequency (RF) chain has high cost and high power consumption, it is impractical to implement fully digital beamforming in the mmWave communication systems. In this paper, we propose a secure transmission scheme with limited RF chains by implementing a lens antenna array in a mmWave multiple-input single-output multiple-eavesdropper (MISOME) wiretap channel. Due to the energy-focusing property of a lens antenna array, the proposed scheme requires a few RF chains for secure communication, not just the number of all antennas. We adopt artificial noise (AN) to degrade the wiretap channel in both cases of available channel state information of the eavesdropper (CSIE) at the transmitter and unavailable that. For the CSIE available case, a simple antennas selection scheme is proposed. We propose an algorithm for selecting antennas and designing analog phase shifters in the CSIE unavailable case. Numerical results demonstrate a remarkable secrecy performance enhancement compared with other hybrid beamforming strategies exploiting a conventional uniform planar array (UPA).
{"title":"Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems","authors":"Hyojin Lee, Wanjik Kim, Joonhyuk Kang","doi":"10.1109/MILCOM47813.2019.9020922","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020922","url":null,"abstract":"Millimeter wave (mmWave) communication is considered as a promising technology for future wireless communication systems. Since a radio-frequency (RF) chain has high cost and high power consumption, it is impractical to implement fully digital beamforming in the mmWave communication systems. In this paper, we propose a secure transmission scheme with limited RF chains by implementing a lens antenna array in a mmWave multiple-input single-output multiple-eavesdropper (MISOME) wiretap channel. Due to the energy-focusing property of a lens antenna array, the proposed scheme requires a few RF chains for secure communication, not just the number of all antennas. We adopt artificial noise (AN) to degrade the wiretap channel in both cases of available channel state information of the eavesdropper (CSIE) at the transmitter and unavailable that. For the CSIE available case, a simple antennas selection scheme is proposed. We propose an algorithm for selecting antennas and designing analog phase shifters in the CSIE unavailable case. Numerical results demonstrate a remarkable secrecy performance enhancement compared with other hybrid beamforming strategies exploiting a conventional uniform planar array (UPA).","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127207783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020896
L. Nguyen, J. Tringe, Clayton Bosler, David Brunnenmeyer
This paper proposes a generic SATCOM control loop in a generic multivector structure to facilitate predictive analysis for achieving resiliency under time varying circumstances. The control loop provides strategies and actions in the context of game theory to optimize the resources for SATCOM networks. Details of the theoretic game and resources optimization approaches are discussed in the paper.
{"title":"An Algorithmic Approach to Highly Resilient SATCOM","authors":"L. Nguyen, J. Tringe, Clayton Bosler, David Brunnenmeyer","doi":"10.1109/MILCOM47813.2019.9020896","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020896","url":null,"abstract":"This paper proposes a generic SATCOM control loop in a generic multivector structure to facilitate predictive analysis for achieving resiliency under time varying circumstances. The control loop provides strategies and actions in the context of game theory to optimize the resources for SATCOM networks. Details of the theoretic game and resources optimization approaches are discussed in the paper.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124968946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020776
Feng Ouyang, O. Somerlock, Arnab Das, David E. Bengtson
Directional wireless links are seeing increasing importance in tactical networking, to which anti-jamming (a part of spectrum dominance) is a critical requirement. However, current literature lack adequate metrics to measure anti-jamming (AJ) capabilities of a directional receiver. This paper proposes three AJ metrics that are both operationally relevant and with enough generality to provide design guidance. These metrics enable performance comparison under three classes of use cases.
{"title":"Assessing Anti-Jamming Performance of Directional Wireless Links","authors":"Feng Ouyang, O. Somerlock, Arnab Das, David E. Bengtson","doi":"10.1109/MILCOM47813.2019.9020776","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020776","url":null,"abstract":"Directional wireless links are seeing increasing importance in tactical networking, to which anti-jamming (a part of spectrum dominance) is a critical requirement. However, current literature lack adequate metrics to measure anti-jamming (AJ) capabilities of a directional receiver. This paper proposes three AJ metrics that are both operationally relevant and with enough generality to provide design guidance. These metrics enable performance comparison under three classes of use cases.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9021052
Lauren J. Wong, P. White, Michael Fowler, W. Headley
This work presents an approach for performing automatic modulation classification (AMC) in a distributed environment using a novel multi-input averaging Convolutional Neural Network (CNN) which ingests one instance of raw received data, in Inphase/Quadrature (IQ) format, and compressed realizations of the same signal from neighboring nodes. Further, this work examines the use of undercomplete autoencoders (AEs) as a means to compress raw received IQ data for transmission to neighboring nodes while retaining the signal features most pertinent to performing AMC. The accuracy of the developed approach is evaluated using simulated BPSK, QPSK, and 16QAM signals, with a noise-only class, and the impact of the compression ratio, number of nodes, and SNR are considered. While results show that the implemented AE is not an effective means of compressing raw IQ data, results did show that by combining data realizations from neighboring nodes using the proposed approach, classification accuracy increases by as much as 7% per node.
{"title":"Distributed Automatic Modulation Classification with Compressed Data","authors":"Lauren J. Wong, P. White, Michael Fowler, W. Headley","doi":"10.1109/MILCOM47813.2019.9021052","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021052","url":null,"abstract":"This work presents an approach for performing automatic modulation classification (AMC) in a distributed environment using a novel multi-input averaging Convolutional Neural Network (CNN) which ingests one instance of raw received data, in Inphase/Quadrature (IQ) format, and compressed realizations of the same signal from neighboring nodes. Further, this work examines the use of undercomplete autoencoders (AEs) as a means to compress raw received IQ data for transmission to neighboring nodes while retaining the signal features most pertinent to performing AMC. The accuracy of the developed approach is evaluated using simulated BPSK, QPSK, and 16QAM signals, with a noise-only class, and the impact of the compression ratio, number of nodes, and SNR are considered. While results show that the implemented AE is not an effective means of compressing raw IQ data, results did show that by combining data realizations from neighboring nodes using the proposed approach, classification accuracy increases by as much as 7% per node.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020802
P. Eliardsson, E. Axell, Arwid Komulainen, K. Wiklundh, Sara Orn Tengstrand
Forward error correction is a means to achieve robust communications. Knowing the performance of the error correcting code under operating circumstances is crucial in making a robust and cost-efficient design choice. Performance of error correcting codes are usually attained under the assumption of additive white Gaussian noise (AWGN). Such performance estimates can be orders of magnitude from the truth in impulse noise environments, that are common in military, automotive and industrial environments with lots of emitters and electronic equipment co-located closely together. A method previously proposed to model the impact of impulse noise, without the use of error correcting coding, is the impulsiveness correction factor (ICF), which can easily be measured. The main contribution of this work is to propose a practical method, using the ICF, to approximate the communication performance in impulse noise channels for a system using convolutional coding. Performance is evaluated in terms of bit error probability (BEP) at a given signal-to-noise ratio (SNR), or analogously the required SNR to achieve a given BEP. The proposed method is practically useful for a wide range of interference types, and is derived numerically since the problem is analytically intractable. The proposed method uses the ICF of the uncoded system, code performance estimates for AWGN, and knowledge of the code parameters.
{"title":"A Practical Method for BEP Estimation of Convolutional Coding in Impulse Noise Environments","authors":"P. Eliardsson, E. Axell, Arwid Komulainen, K. Wiklundh, Sara Orn Tengstrand","doi":"10.1109/MILCOM47813.2019.9020802","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020802","url":null,"abstract":"Forward error correction is a means to achieve robust communications. Knowing the performance of the error correcting code under operating circumstances is crucial in making a robust and cost-efficient design choice. Performance of error correcting codes are usually attained under the assumption of additive white Gaussian noise (AWGN). Such performance estimates can be orders of magnitude from the truth in impulse noise environments, that are common in military, automotive and industrial environments with lots of emitters and electronic equipment co-located closely together. A method previously proposed to model the impact of impulse noise, without the use of error correcting coding, is the impulsiveness correction factor (ICF), which can easily be measured. The main contribution of this work is to propose a practical method, using the ICF, to approximate the communication performance in impulse noise channels for a system using convolutional coding. Performance is evaluated in terms of bit error probability (BEP) at a given signal-to-noise ratio (SNR), or analogously the required SNR to achieve a given BEP. The proposed method is practically useful for a wide range of interference types, and is derived numerically since the problem is analytically intractable. The proposed method uses the ICF of the uncoded system, code performance estimates for AWGN, and knowledge of the code parameters.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122815440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020858
Florian Meyer, M. Win
The sum-product algorithm for data association (SPADA) provides a highly effective, efficient, and scalable solution to the probabilistic data association problem, a major challenge in multitarget tracking. Similar to most existing data association algorithms, the SPADA is also based on the conventional data association assumption: Targets either produce no measurements or produce a single measurement at each time step and sensor. This paper presents the results of experiments with an extension of SPADA that is suitable for the case where targets can generate multiple measurements. This extension is general in the sense that the number of measurements generated by a target is modeled by an arbitrary truncated probability mass function (PMF) and enables extended target tracking (ETT) by performing probabilistic multiple-measurement to target associations. ETT is especially suitable for inexpensive high-resolution millimeter-wave radar sensors. We demonstrate the favorable performance-complexity tradeoff of the proposed method in a challenging tracking problem involving three closely-spaced targets that produce multiple measurements.
数据关联和积算法(sum-product algorithm for data association, SPADA)为概率数据关联问题提供了一种高效、可扩展的解决方案,这是多目标跟踪中的一个主要挑战。与大多数现有的数据关联算法类似,SPADA也是基于传统的数据关联假设:目标在每个时间步长和传感器上要么不产生测量,要么产生单个测量。本文介绍了SPADA扩展的实验结果,该扩展适用于目标可以产生多个测量值的情况。这种扩展是通用的,因为目标生成的测量数量由任意截断概率质量函数(PMF)建模,并通过对目标关联执行概率多重测量来实现扩展目标跟踪(ETT)。ETT特别适用于廉价的高分辨率毫米波雷达传感器。我们在一个具有挑战性的跟踪问题中展示了所提出方法的良好性能-复杂性权衡,该问题涉及三个紧密间隔的目标,产生多个测量。
{"title":"Data Association for Tracking Extended Targets","authors":"Florian Meyer, M. Win","doi":"10.1109/MILCOM47813.2019.9020858","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020858","url":null,"abstract":"The sum-product algorithm for data association (SPADA) provides a highly effective, efficient, and scalable solution to the probabilistic data association problem, a major challenge in multitarget tracking. Similar to most existing data association algorithms, the SPADA is also based on the conventional data association assumption: Targets either produce no measurements or produce a single measurement at each time step and sensor. This paper presents the results of experiments with an extension of SPADA that is suitable for the case where targets can generate multiple measurements. This extension is general in the sense that the number of measurements generated by a target is modeled by an arbitrary truncated probability mass function (PMF) and enables extended target tracking (ETT) by performing probabilistic multiple-measurement to target associations. ETT is especially suitable for inexpensive high-resolution millimeter-wave radar sensors. We demonstrate the favorable performance-complexity tradeoff of the proposed method in a challenging tracking problem involving three closely-spaced targets that produce multiple measurements.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020761
Manas Pradhan, Sushma Devaramani
Smart Cities of the future come with the promise of betterment of human civilization. Technology usage in Smart Cities rely heavily on Internet-of-Things (IoT) concepts along with the legacy Information and Communications Technology (ICT) assets. Apart from the static assets deployed across the city such as sensors, the IoT revolution has enabled the development of cheaper yet effective robotic devices. While the robots in the market are becoming more accessible enabling adoption by private individuals as well as governmental agencies, there is the lack of interoperability between the robotic devices. Especially during Humanitarian Assistance and Disaster Recovery (HADR) operations in Smart City environments, robotic devices deployed from a single agency might not scale for HADR operations. In such cases, it is necessary to ensure multi-agency sharing of robotic capabilities. This paper proposes a ROS-based platform-independent architecture for robotic devices that can be adopted by civilian and military agencies to share capabilities during HADR operations.
{"title":"Enabling Interoperability for ROS-based Robotic Devices for Smart City HADR Operations","authors":"Manas Pradhan, Sushma Devaramani","doi":"10.1109/MILCOM47813.2019.9020761","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020761","url":null,"abstract":"Smart Cities of the future come with the promise of betterment of human civilization. Technology usage in Smart Cities rely heavily on Internet-of-Things (IoT) concepts along with the legacy Information and Communications Technology (ICT) assets. Apart from the static assets deployed across the city such as sensors, the IoT revolution has enabled the development of cheaper yet effective robotic devices. While the robots in the market are becoming more accessible enabling adoption by private individuals as well as governmental agencies, there is the lack of interoperability between the robotic devices. Especially during Humanitarian Assistance and Disaster Recovery (HADR) operations in Smart City environments, robotic devices deployed from a single agency might not scale for HADR operations. In such cases, it is necessary to ensure multi-agency sharing of robotic capabilities. This paper proposes a ROS-based platform-independent architecture for robotic devices that can be adopted by civilian and military agencies to share capabilities during HADR operations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9021002
L. Nguyen, R. Wells, D. Nguyen, N. Tran
This paper presents a theoretical approach for estimating the performance of moderate-length codes under partial-band noise jamming (PBNJ). The approach is based on the outage probability, which is the probability that the mutual information rate random variable is less than the code rate. This paper is an extension of previous work where we obtained a closed form expression for the outage probability of moderate-length codes under additive Gaussian noise channel (AWGN) [8]. Using the results under AWGN, we obtain a closed form expression for the outage probability under partial-band noise jamming (PBNJ). Using this result, we show that a smart jammer is driven to employ a full-band (FB) noise jamming. Relative to FB jamming, there is no advantage of PBNJ. These analytical results are compared against simulation results obtained for Protected Tactical Waveform (PTW) using Second Generation Digital Video Broadcasting Satellite (DVB-S2) forward error correction (FEC) codes under PBNJ.
{"title":"Outage Probability and Performance of Moderate-Length Codes under Partial-Band Noise Jamming (PBNJ)","authors":"L. Nguyen, R. Wells, D. Nguyen, N. Tran","doi":"10.1109/MILCOM47813.2019.9021002","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021002","url":null,"abstract":"This paper presents a theoretical approach for estimating the performance of moderate-length codes under partial-band noise jamming (PBNJ). The approach is based on the outage probability, which is the probability that the mutual information rate random variable is less than the code rate. This paper is an extension of previous work where we obtained a closed form expression for the outage probability of moderate-length codes under additive Gaussian noise channel (AWGN) [8]. Using the results under AWGN, we obtain a closed form expression for the outage probability under partial-band noise jamming (PBNJ). Using this result, we show that a smart jammer is driven to employ a full-band (FB) noise jamming. Relative to FB jamming, there is no advantage of PBNJ. These analytical results are compared against simulation results obtained for Protected Tactical Waveform (PTW) using Second Generation Digital Video Broadcasting Satellite (DVB-S2) forward error correction (FEC) codes under PBNJ.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9020952
Michael Fletcher, J. Gaeddert, Alan J. Michaels
The time-aligned injection of a co-channel underlay-based watermark for authentication at the receiver is an effective method to enhance physical layer security. While firewalls have traditionally been used to manage authorized traffic in wired networks, this paper provides the design and implementation of similar functions for wireless networks. The physical layer firewall only allows receiver access in cases where the valid watermark is detected concurrent to the incoming primary signal, and may be used with virtually any network waveform. Moreover, the use of non-repeating arbitrary-phase spread spectrum signals eliminates many common replay attacks. A hardware prototype is built to receive IEEE 802.11g primary signals with arbitrary-phase spread spectrum underlays, showing reliable authentication performance with only minor bit error rate degradation up to Modulation and Coding Scheme 5. Future prototypes are suggested to further optimize performance, for use with other data waveforms, and to demonstrate higher layer protocols.
{"title":"Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark Authentication","authors":"Michael Fletcher, J. Gaeddert, Alan J. Michaels","doi":"10.1109/MILCOM47813.2019.9020952","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020952","url":null,"abstract":"The time-aligned injection of a co-channel underlay-based watermark for authentication at the receiver is an effective method to enhance physical layer security. While firewalls have traditionally been used to manage authorized traffic in wired networks, this paper provides the design and implementation of similar functions for wireless networks. The physical layer firewall only allows receiver access in cases where the valid watermark is detected concurrent to the incoming primary signal, and may be used with virtually any network waveform. Moreover, the use of non-repeating arbitrary-phase spread spectrum signals eliminates many common replay attacks. A hardware prototype is built to receive IEEE 802.11g primary signals with arbitrary-phase spread spectrum underlays, showing reliable authentication performance with only minor bit error rate degradation up to Modulation and Coding Scheme 5. Future prototypes are suggested to further optimize performance, for use with other data waveforms, and to demonstrate higher layer protocols.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123501077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/MILCOM47813.2019.9021026
Mainduddin Ahmad Jonas, Md. Shohrab Hossain, Risul Islam, Husnu S. Narman, Mohammed Atiquzzaman
An intelligent system to prevent SSL Stripping based session hijacking attacks is proposed in this paper. The system is designed to strike a delicate balance between security and user-friendliness. Common user behavior towards security warnings is taken into account and combined with well-known machine learning and statistical techniques to build a robust solution against SSL Stripping. Users are shown warning messages of various levels based on the importance of each website from a security point of view. Initially, websites are classified using a Naive Bayes classifier. User responses towards warnings messages are stored and combined at a central database server to provide a modified and continuously improving rating system for websites. The system serves to both protect and educate users without causing them an unnecessary annoyance.
{"title":"An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks","authors":"Mainduddin Ahmad Jonas, Md. Shohrab Hossain, Risul Islam, Husnu S. Narman, Mohammed Atiquzzaman","doi":"10.1109/MILCOM47813.2019.9021026","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021026","url":null,"abstract":"An intelligent system to prevent SSL Stripping based session hijacking attacks is proposed in this paper. The system is designed to strike a delicate balance between security and user-friendliness. Common user behavior towards security warnings is taken into account and combined with well-known machine learning and statistical techniques to build a robust solution against SSL Stripping. Users are shown warning messages of various levels based on the importance of each website from a security point of view. Initially, websites are classified using a Naive Bayes classifier. User responses towards warnings messages are stored and combined at a central database server to provide a modified and continuously improving rating system for websites. The system serves to both protect and educate users without causing them an unnecessary annoyance.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}