Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks

被引:0
|
作者
Liu, Qiao [1 ,2 ]
Gong, Guang [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[2] Xidian Univ, State Key Lab ISN, Xian, Shaanxi, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
MANETs; MIMO; Physical Layer Security; Information Exchange Protocol; Passive Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel models, we design a basic protocol with a minimized time slot cost, i.e. n + 1. Based on this basic protocol, we show that the attacker, either untrusted relay or external eavesdropper, can only obtain a summed signal in each time slot, and this summed signal cannot be decomposed to recover the individual information from the users. We then present cryptographic analysis for the first time to identify a weakness which is common for all known security schemes based on the summed signal. Thirdly, we introduce an evolutionary protocol proposed with two rounds of interlaced information exchange, which defeats this weakness. Finally, the simulation is performed to demonstrate the theoretical analysis.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [2] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [3] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [4] A new secure routing protocol to defend Byzantine attacks for ad hoc networks
    Yu, M
    Kulkarni, S
    Lau, P
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1126 - 1131
  • [5] Secure group information exchange scheme for vehicular ad hoc networks
    Lu Zhou
    Qiao Liu
    Yong Wang
    Hui Li
    Personal and Ubiquitous Computing, 2017, 21 : 903 - 910
  • [6] Secure cooperative mobile ad hoc networks against injecting traffic attacks
    Yu, W
    Liu, KJR
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 55 - 64
  • [7] Secure group information exchange scheme for vehicular ad hoc networks
    Zhou, Lu
    Liu, Qiao
    Wang, Yong
    Li, Hui
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 903 - 910
  • [8] Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 31 - 40
  • [9] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [10] SECURE ENCRYPTION PROTOCOL FOR AD HOC NETWORKS
    Arora, Shivika
    Nagrath, Preeti
    Aneja, Sandhya
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,