Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks

The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. In the model, the authentication error is expressed a pair(p_1, p_2). Based on the authentication error, a cooperative transmission protocol against impersonation attack is presented. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The Error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.

[1]  Donald F. Towsley,et al.  Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  A. Robert Calderbank,et al.  Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.

[3]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[4]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[5]  H. Vincent Poor,et al.  Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.

[6]  Onur Ozan Koyluoglu,et al.  Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.

[7]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[8]  N.H. Vaidya,et al.  Secure capacity of multi-hop wireless networks with random key pre-distribution , 2008, IEEE INFOCOM Workshops 2008.

[9]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[10]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[11]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[12]  A. Robert Calderbank,et al.  Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels , 2009, 2009 Information Theory and Applications Workshop.

[13]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[14]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  V. Sankaranarayanan,et al.  Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .

[17]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[18]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[20]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..