Transmit Optimization for Symbol-Level Spoofing

With recent developments in wireless communication technologies, malicious users can use them to commit crimes or launch terror attacks, thus imposing new threats on public security. To quickly respond to these attacks, authorized parities need to intervene in the malicious communication links over the air. This paper investigates the emerging wireless communication intervention problem at the physical layer. Unlike prior studies using jamming to disrupt or disable the targeted wireless communications, we propose a new physical-layer spoofing approach to change their communicated information. Consider an abstract three-node model over additive white Gaussian noise channels, in which a legitimate spoofer aims to spoof a malicious communication link from a malicious transmitter to a malicious receiver, such that the received message at the receiver is changed from the transmitter’s originally sent message to the one desired by the spoofer. We propose a new symbol-level spoofing scheme, where the spoofer designs the spoofing signal by exploiting the symbol-level relationship between each original constellation point of the transmitter and the desirable one of the spoofer. In particular, the spoofer aims to minimize the average spoofing-symbol-error-rate (SSER), which is defined as the average probability that the symbols decoded by the malicious receiver fail to be changed or spoofed, by designing its spoofing signals over symbols subject to the average transmit power constraint. By considering two cases when the malicious transmitter employs the widely-used binary phase-shift keying and quadrature phase-shift keying modulations, we obtain the respective optimal solutions to the two average SSER minimization problems. Numerical results show that the symbol-level spoofing scheme with optimized transmission achieves a much lower average SSER, as compared with other benchmark schemes.

[1]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[2]  Christos Masouros,et al.  Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization , 2015, IEEE Transactions on Signal Processing.

[3]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[4]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[5]  Rui Zhang,et al.  Active eavesdropping via spoofing relay attack , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Jie Xu,et al.  Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.

[7]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[8]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Eduard Axel Jorswieck,et al.  Optimal transmitter and jamming strategies in Gaussian MIMO channels , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[10]  Christos Masouros,et al.  Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems , 2009, IEEE Transactions on Wireless Communications.

[11]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing with BPSK Signaling , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[12]  Sennur Ulukus,et al.  Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.

[13]  Symeon Chatzinotas,et al.  Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.

[14]  Miguel R. D. Rodrigues,et al.  On multiple-input multiple-output Gaussian channels with arbitrary inputs subject to jamming , 2009, 2009 IEEE International Symposium on Information Theory.

[15]  Ming Li,et al.  Disrupting MIMO Communications With Optimal Jamming Signal Design , 2015, IEEE Transactions on Wireless Communications.

[16]  Dijiang Huang,et al.  Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[17]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[18]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[19]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[20]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[21]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[22]  Symeon Chatzinotas,et al.  Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.

[23]  J.M. Cioffi,et al.  Spatially-Correlated Jamming in Gaussian Multiple Access and Broadcast Channels , 2006, 2006 40th Annual Conference on Information Sciences and Systems.