Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair

Ahmed El Shafie, Kamel Tourki, Zhiguo Ding, Naofal Al-Dhahir

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the random data arrival behavior at the transmitter and the channel randomness of the legitimate link can improve the system's security. We design a jamming scheme for the attacker and investigate its impact on the secure throughput of the legitimate system. The attacker designs his power splitting parameter and jamming/eavesdropping probability based on the energy state of the attacker's battery to minimize the secure throughput of the legitimate system.

Original languageBritish English
Article number7886350
Pages (from-to)1549-1552
Number of pages4
JournalIEEE Communications Letters
Volume21
Issue number7
DOIs
StatePublished - Jul 2017

Keywords

  • DoS
  • eavesdropping
  • energy harvesting

Fingerprint

Dive into the research topics of 'Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair'. Together they form a unique fingerprint.

Cite this