Loading [MathJax]/extensions/MathMenu.js
Eavesdropping area for evaluating the security of wireless communications | IEEE Journals & Magazine | IEEE Xplore

Eavesdropping area for evaluating the security of wireless communications


Abstract:

Compared with wired communication, the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature. To prevent eavesdrop...Show More

Abstract:

Compared with wired communication, the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature. To prevent eavesdropping, many researches on transmission techniques or cryptographic methods are carried out. This paper proposes a new index parameter named as eavesdropping area, to evaluate the anti-eavesdropping performance of wireless system. Given the locations of legitimate transmitter and receiver, eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region. This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification. Corresponding key system parameters are analyzed, including the characteristics of eavesdropping region, transmitted beam pattern, beam direction, receiver sensitivity, eavesdropping sensitivity, path loss exponent and so on. The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability.
Published in: China Communications ( Volume: 19, Issue: 3, March 2022)
Page(s): 145 - 157
Date of Publication: 30 March 2022
Print ISSN: 1673-5447
Citations are not available for this document.

Cites in Papers - |

Cites in Papers - IEEE (3)

Select All
1.
Yichao Chen, Guanbang Liu, Zhen Zhang, Lidong He, Shibo He, "Improving Physical Layer Security for multi-UAV Systems Against Hybrid Wireless Attacks", IEEE Transactions on Vehicular Technology, vol.73, no.5, pp.7034-7048, 2024.
2.
Dawei Wang, Menghan Wu, Chinmay Chakraborty, Lingtong Min, Yixin He, Manisha Guduri, "Covert Communications in Air-Ground Integrated Urban Sensing Networks Enhanced by Federated Learning", IEEE Sensors Journal, vol.24, no.5, pp.5636-5643, 2024.
3.
Yichao Chen, Kai Zhao, Heng Zhang, Shibo He, "A Comprehensive Physical Layer Security Mechanism for Mobile Edge Computing", IEEE Internet of Things Journal, vol.10, no.19, pp.16816-16829, 2023.

Cites in Papers - Other Publishers (4)

1.
Haitham Mahmoud, Tawfik Ismail, Tobi Baiyekusi, Moad Idrissi, "Advanced Security Framework for 6G Networks: Integrating Deep Learning and Physical Layer Security", Network, vol.4, no.4, pp.453, 2024.
2.
Geetanjali Rathee, Akshay Kumar, S. Karthikeyan, N. Yuvaraj, "Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme", Wireless Communication for Cybersecurity, pp.199, 2023.
3.
Kamil Prokop, Andrzej Bień, Szymon Barczentewicz, "Compression Techniques for Real-Time Control and Non-Time-Critical Big Data in Smart Grids: A Review", Energies, vol.16, no.24, pp.8077, 2023.
4.
Ahmed S. Alfakeeh, Muhammad Awais Javed, "Stable Matching Assisted Resource Allocation in Fog Computing Based IoT Networks", Mathematics, vol.11, no.17, pp.3798, 2023.
Contact IEEE to Subscribe