Transmit Optimization for Symbol-Level Spoofing with BPSK Signaling

The misuse of wireless communications by malicious users imposes new threats on the public security, and authorized parities need to intervene in the malicious communication links over the air. This paper investigates this emerging wireless communication intervention problem at the physical layer. Unlike prior studies using jamming to disrupt or disable the targeted wireless communications, we propose a new physical-layer spoofing approach to change their communicated information. Consider a fundamental three-node system over additive white Gaussian noise (AWGN) channels, in which an intermediary legitimate spoofer aims to spoof a malicious communication link from Alice to Bob, such that the received message at Bob is changed from Alice's originally sent message to the one desired by the spoofer. We propose a new symbol-level spoofing scheme, where the spoofer designs the spoofing signal via exploiting the symbol-level relationship between each original constellation point of Alice and the desirable one of the spoofer. In particular, the spoofer aims to minimize the average spoofing-symbol-error-rate (SSER), which is defined as the average probability that the symbols decoded by Bob fail to be changed or spoofed, by designing its spoofing signals over symbols subject to the average transmit power constraint. By considering the case when Alice employs the widely- used binary phase-shift keying (BPSK) modulation, we obtain the optimal solution to the average SSER minimization problem. Numerical results show that the symbol-level spoofing scheme with optimized transmission achieves a much lower average SSER, as compared to other benchmark schemes.

[1]  Christos Masouros,et al.  Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems , 2009, IEEE Transactions on Wireless Communications.

[2]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[3]  Ming Li,et al.  Disrupting MIMO Communications With Optimal Jamming Signal Design , 2015, IEEE Transactions on Wireless Communications.

[4]  Rui Zhang,et al.  Active eavesdropping via spoofing relay attack , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[5]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[6]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[7]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.

[8]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[9]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[10]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[11]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[12]  Symeon Chatzinotas,et al.  Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.

[13]  Symeon Chatzinotas,et al.  Secure M-PSK communication via directional modulation , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Symeon Chatzinotas,et al.  Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.