On modeling eavesdropping attacks in wireless networks

Xuran LI, Jianlong XU, Hong Ning DAI*, Qinglin ZHAO, Chak Fong CHEANG, Qiu WANG

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

16 Citations (Scopus)

Abstract

This paper concerns the eavesdropping attacks from the eavesdroppers' perspective, which is new since most of current studies consider the problem from the good nodes' perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as shadow fading effect, node density, and antenna types). This study lays the foundation toward preventing the eavesdropping attacks in more effective and more economical ways.

Original languageEnglish
Pages (from-to)196-204
Number of pages9
JournalJournal of Computational Science
Volume11
DOIs
Publication statusPublished - 1 Nov 2015
Externally publishedYes

Bibliographical note

Funding Information:
The work described in this paper was supported by Macao Science and Technology Development Fund under Grant No. 036/2011/A , Grant No. 081/2012/A3 and Grant No. 096/2013/A3 and supported by the National Natural Science Foundation of China with Grant No. 61472338 . The authors would like to thank Gordon G.-D. Han for his excellent comments.

Publisher Copyright:
© 2014 Elsevier B.V.

Keywords

  • Eavesdropping
  • Modeling
  • Security
  • Wireless networks

Fingerprint

Dive into the research topics of 'On modeling eavesdropping attacks in wireless networks'. Together they form a unique fingerprint.

Cite this