Ozan Alp Topal, Mehmet Ozgun Demir, Guido Dartmann, A. Schmeink, G. Ascheid, A. E. Pusane, Günes Karabulut-Kurt
{"title":"针对窃听攻击的物理层欺骗","authors":"Ozan Alp Topal, Mehmet Ozgun Demir, Guido Dartmann, A. Schmeink, G. Ascheid, A. E. Pusane, Günes Karabulut-Kurt","doi":"10.1109/MECO.2019.8760168","DOIUrl":null,"url":null,"abstract":"In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal. We define the probability of spoofing an eavesdropper as the spoofing probability and obtain the closed form expression in presence of fading channels. We also obtain the spoofing rate and the spoofing probability under a selected communication rate requirement for Alice and Bob.","PeriodicalId":141324,"journal":{"name":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Physical Layer Spoofing Against Eavesdropping Attacks\",\"authors\":\"Ozan Alp Topal, Mehmet Ozgun Demir, Guido Dartmann, A. Schmeink, G. Ascheid, A. E. Pusane, Günes Karabulut-Kurt\",\"doi\":\"10.1109/MECO.2019.8760168\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal. We define the probability of spoofing an eavesdropper as the spoofing probability and obtain the closed form expression in presence of fading channels. We also obtain the spoofing rate and the spoofing probability under a selected communication rate requirement for Alice and Bob.\",\"PeriodicalId\":141324,\"journal\":{\"name\":\"2019 8th Mediterranean Conference on Embedded Computing (MECO)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 8th Mediterranean Conference on Embedded Computing (MECO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MECO.2019.8760168\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MECO.2019.8760168","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical Layer Spoofing Against Eavesdropping Attacks
In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal. We define the probability of spoofing an eavesdropper as the spoofing probability and obtain the closed form expression in presence of fading channels. We also obtain the spoofing rate and the spoofing probability under a selected communication rate requirement for Alice and Bob.