Capability Modeling of Information Deceiving and Achieving in Message Tampering Confrontations

In confronting communication environments, the attackers can tamper with messages and consequently deceive the receivers as long as the malicious actions are not recognized. Although numerous works have been done to alleviate the damage of such threat, no special model has been formed to demonstrate the accurate capability bounds of the attackers and defenders in such confrontations so far. Inspired by this problem as well as the Shannon channel capacity model, this paper converts the confronting capability problems into channel capacity issues, and forms the capability models for both the attackers in information deceiving and the receivers in information achieving. The models, which are rigorously proved, reveal the capability upper bounds of the attackers and the receivers in message tampering confrontations, no matter any specific measures the confronting peers taking. Extensive simulations are implemented and the results verify the effectiveness of the proposed models, which simultaneously indicate the optimal strategies of both the attackers and the receivers.

[1]  Hai Jin,et al.  An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing , 2014, Proceedings of 2014 International Conference on Cloud Computing and Internet of Things.

[2]  Biplab Sikdar,et al.  Detecting Data Tampering In Synchrophasors Using Power Flow Entropy , 2018, 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).

[3]  Ilija Jovanov,et al.  Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[4]  Jelena V. Misic,et al.  Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Vipul Goyal,et al.  Non-malleable secret sharing , 2018, IACR Cryptol. ePrint Arch..

[6]  Mahmoud Salmasizadeh,et al.  Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection , 2018, IACR Cryptol. ePrint Arch..

[7]  Yixian Yang,et al.  An overview of general theory of security , 2017, China Communications.

[8]  Niimi Michiharu,et al.  Compatible 2d-code having tamper detection system with QR-code , 2014 .

[9]  Xingwei Wang,et al.  A security multi-path transmission algorithm based on link-security-level , 2014 .

[10]  Huirong Fu,et al.  Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).

[11]  Vlastimil Clupek,et al.  Robust mutual authentication and secure transmission of information on low-cost devices using Physical unclonable functions and Hash functions , 2016, 2016 39th International Conference on Telecommunications and Signal Processing (TSP).

[12]  Biplab Sikdar,et al.  Detecting data tampering attacks in synchrophasor networks using time hopping , 2016, 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).

[13]  Sanjay Kumar Dhurandher,et al.  Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[14]  Tao Liu,et al.  Studied on Application of Double Encryption Algorithm in Covert Channel Transmission , 2018, 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS).

[15]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .