On Secure Wireless Communications for Service Oriented Computing

Service Oriented Computing (SOC) has initially developed for the Internet, but also identified as an appealing computing paradigm for developing applications in distributed wireless environments. The open nature of wireless medium may expose services to a variety of unauthorized third parties (eavesdroppers), resulting in insecure service interactions, while cooperative jamming is promising to provide a strong form of security. This paper focuses on security performance study of wireless communications for service interactions among different parties in SOC. More specifically, this paper establishes a theoretical framework for the study of eavesdropper-tolerance capability (i.e., the maximum number of eavesdroppers that can be tolerated) in a two-hop wireless network, where the cooperative jamming is adopted to ensure security defined by secrecy outage probability (SOP) and opportunistic relaying is adopted to guarantee reliability defined by transmission outage probability (TOP). For the concerned network, exact modeling for SOP and fine approximation for TOP are first conducted based on the Central Limit Theorem. With the help of SOP and TOP models and also the Stochastic Ordering Theory, the model for eavesdropper-tolerance capability analysis is then developed. Finally, extensive simulation and numerical results are provided to illustrate the efficiency of our theoretical framework as well as the eavesdropper-tolerance capability of the concerned network from adopting cooperative jamming and opportunistic relaying.

[1]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[4]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[5]  Donald F. Towsley,et al.  Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[6]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[7]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[8]  Blake D. Bryant,et al.  IEEE Transactions on Information Forensics and Security , 2018 .

[9]  Xinbing Wang,et al.  Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[12]  H. Vincent Poor,et al.  Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.

[13]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[14]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[15]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[18]  Jie Li,et al.  Secrecy capacity maximization for secure cooperative ad-hoc networks , 2013, 2013 Proceedings IEEE INFOCOM.

[19]  Xiaohong Jiang,et al.  Flexible relay selection for secure communication in two-hop wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[20]  Xinbing Wang,et al.  Secrecy capacity scaling of large-scale cognitive networks , 2014, MobiHoc '14.

[21]  Xiaohong Jiang,et al.  Eavesdropper tolerance capability study in two-hop cooperative wireless networks , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).

[22]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[23]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[24]  Georgios Kambourakis,et al.  DoS attacks exploiting signaling in UMTS and IMS , 2011, Comput. Commun..

[25]  João Barros,et al.  Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.

[26]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[27]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[28]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[29]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[30]  Contact details of the first author: , 2022 .

[31]  Yi Xie,et al.  Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior , 2013, IEEE Transactions on Parallel and Distributed Systems.

[32]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[33]  Min Chen,et al.  User-Oriented and Service-oriented Spontaneous Ad Hoc and Sensor Wireless Networks , 2012, Ad Hoc Sens. Wirel. Networks.

[34]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[35]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[36]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[37]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[38]  Paolo Traverso,et al.  Service-Oriented Computing: State of the Art and Research Challenges , 2007, Computer.

[39]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[40]  Raef Bassily,et al.  Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.

[41]  Xinbing Wang,et al.  Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks , 2014, IEEE/ACM Transactions on Networking.

[42]  Donald F. Towsley,et al.  Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.

[43]  L. Mattner,et al.  Stochastic ordering of classical discrete distributions , 2009, Advances in Applied Probability.

[44]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[45]  Eric Mayer Service Oriented Computing Semantics Processes Agents , 2016 .

[46]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.

[47]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[48]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[49]  Sathya Narayanan,et al.  Two-hop forwarding in wireless networks , 2006 .