当前位置: X-MOL 学术Ad Hoc Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Benign false-data injection as a moving-target defense to secure mobile wireless communications
Ad Hoc Networks ( IF 4.8 ) Pub Date : 2020-01-23 , DOI: 10.1016/j.adhoc.2019.102064
Esraa M. Ghourab , Mohamed Azab

The latest advances in the Internet of Vehicle (IoV) networks, and Software Defined Radio (SDR) enabled spectrum sharing between anonymous users. Such enablement raised many concerns in regards to the system’s security and privacy. Therefore, there is a desperate need for transformative solutions to ensure wireless communication security against eavesdropping attacks.

This paper presents a novel Moving-target Defense (MtD) to enhance the channel secrecy capacity in a Decode-and- Forward (DF) dual-phase large network containing K relays and source nodes with multi-antennas operating on different frequencies. Our MtD approach enables multidimensional spatiotemporal diversification for the user’s traffic in cooperative wireless transmission, to obfuscate signal transmission-patterns and data, across the entire spectrum available. In time, we obfuscate the transmitted data by employing real-time shuffling between real and fake data. In space, we enforce real-time hopping between multiple frequencies to evade signal tracing. We examine the ergodic channel secrecy capacity considering two behavioral patterns; cooperative and uncooperative untrustworthy-relays.

Simulation results showed that, for a powerful malicious user with multiple access points, and no pre-knowledge of the diversification patterns used by the system, it is very hard to eavesdrop a meaningful portion of the signal or the data stream.



中文翻译:

良性错误数据注入作为移动目标防御,可确保移动无线通信的安全

车联网(IoV)网络和软件定义无线电(SDR)的最新进展实现了匿名用户之间的频谱共享。这种启用引起了有关系统安全性和隐私性的许多担忧。因此,迫切需要用于确保针对窃听攻击的无线通信安全性的转换解决方案。

本文提出了一种新颖的移动目标防御(MtD),以增强解码和转发(DF)双相大型网络中的信道保密能力,该网络包含K个中继和工作在不同频率上的多天线源节点。我们的MtD方法使协作无线传输中的用户流量能够实现多维时空多样化,从而在整个可用频谱范围内混淆信号传输模式和数据。在时间,我们采用实时真假数据之间的洗牌混淆传输的数据。在太空,我们会在多个频率之间执行实时跳频,以逃避信号跟踪。我们考虑了两种行为模式来检验遍历通道的保密能力。合作和不合作的不信任中继。

仿真结果表明,对于具有多个访问点且没有预先了解系统使用的多样化模式的强大恶意用户,很难窃听信号或数据流中有意义的部分。

更新日期:2020-01-23
down
wechat
bug