SURVEILLANCE AND INTERVENTION OF INFRASTRUCTURE-FREE MOBILE COMMUNICATIONS: A NEW WIRELESS SECURITY PARADIGM

被引:119
作者
Xu, Jie [1 ,2 ]
Duan, Lingjie [2 ]
Zhang, Rui [3 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
[2] Singapore Univ Technol & Design, Engn Syst & Design Pillar, Singapore, Singapore
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
关键词
Jamming - Mobile telecommunication systems;
D O I
10.1109/MWC.2017.1600279
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional wireless security assumes wireless communications are legitimate, and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging infrastructure-free mobile communication networks can be illegally used (e.g., by criminals or terrorists) but are difficult to monitor, thus imposing new challenges in public security. To tackle this issue, this article presents a paradigm shift of wireless security to the surveillance and intervention of infrastructure-free suspicious and malicious wireless communications, by exploiting legitimate eavesdropping and jamming jointly. In particular, proactive eavesdropping (via jamming) is proposed to intercept and decode information from suspicious communication links for the purpose of inferring their intentions and deciding further measures against them. Cognitive jamming (via eavesdropping) is also proposed to disrupt, disable, and even spoof the targeted malicious wireless communications to achieve various intervention tasks.
引用
收藏
页码:152 / 159
页数:8
相关论文
共 17 条
[1]  
[Anonymous], AIP CONF PROC
[2]  
Bi SZ, 2015, IEEE COMMUN MAG, V53, P190, DOI 10.1109/MCOM.2015.7295483
[3]   Big Data: A Survey [J].
Chen, Min ;
Mao, Shiwen ;
Liu, Yunhao .
MOBILE NETWORKS & APPLICATIONS, 2014, 19 (02) :171-209
[4]  
Du Bowen, 2016, P 22 ACM SIGKDD INT
[5]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[6]   Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks [J].
Kapetanovic, Dzevdan ;
Zheng, Gan ;
Rusek, Fredrik .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :21-27
[7]   Game Theory Meets Network Security and Privacy [J].
Manshaei, Mohammad Hossein ;
Zhu, Quanyan ;
Alpcan, Tansu ;
Basar, Tamer ;
Hubaux, Jean-Pierre .
ACM COMPUTING SURVEYS, 2013, 45 (03)
[8]  
Marx G. T., 2015, International encyclopedia of the social & behavioral sciences, P733, DOI DOI 10.1016/B978-0-08-097086-8.64025-4
[9]  
Medard M., 1997, ALLERTON C COMMUN CO, P1043
[10]  
Nardini G, 2016, 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), P1374