Research Article An Analytical Study on Eavesdropping...

11
Research Article An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things Xuran Li, 1 Hao Wang, 2 Hong-Ning Dai, 1 Yuanyuan Wang, 1 and Qinglin Zhao 1 1 Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Room A208, Taipa, Macau 2 Big Data Lab, Faculty of Engineering and Natural Sciences, Norwegian University of Science & Technology, Postboks 1517, 6025 ˚ Alesund, Norway Correspondence should be addressed to Hong-Ning Dai; [email protected] Received 28 July 2015; Accepted 7 December 2015 Academic Editor: Jong-Hyouk Lee Copyright © 2016 Xuran Li et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. e security of Internet of ings (IoT) has received extensive attention recently. is paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of ings (WNoT). Our model considers various channel conditions, including the path loss, the shadow fading effect, and Rayleigh fading effect. Besides, we also consider the eavesdroppers in WNoT equipped with either omnidirectional antennas or directional antennas. Extensive simulation results show that our model is accurate and effective to model the eavesdropping attacks in WNoT. Besides, our results also indicate that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect, Rayleigh fading effect, and the antenna models. In particular, we find that the shadow fading effect is beneficial to the eavesdropping attacks while both the path loss effect and Rayleigh fading effect are detrimental. Besides, using directional antennas at eavesdroppers can also increase the eavesdropping probability. Our results offer some useful implications on designing antieavesdropping schemes in WNoT. 1. Introduction As one of the most promising information and communica- tion technologies (ICT), IoT has received extensive attentions from both academia and industry recently. e basic idea of IoT is to integrate “smart” objects, the things into the Internet with provision of various services to users [1, 2]. e typical killer applications of IoT include the logistic management with RFID technology [3], environmental monitoring with wireless sensor networks [4], smart homes [5], e-health [6], smart grids [7], Maritime Industry [8], and so forth. ere are a number of diverse smart objects ranging from small Radiofrequency Identification (RFID) tags to sensors, actuators, mobile phones, smart appliances, smart meters, and so forth. Due to the device heterogeneity, various wireless communication technologies (such as ISO/IEC 18000 [3], IEEE 802.15.4 [9], and Bluetooth [10]) are also exploited to interconnect the smart devices to form a Wireless Net of ings (WNoT). Note that the conventional wired commu- nication technologies (Ethernets, fiber-optic communication, etc.) are also mandatory to connect the WNoT with the rest of the Internet. Security is one of the fundamental issues in IoT since it is the prerequisite for most IoT applications [11–14]. ere raise a number of security threats in IoT, especially in WNoT, where the conventional security countermeasures used in wired networks may not work well in WNoT due to the following inherent constraints of WNoT: (i) the wireless medium is open for any nodes [15]; (ii) it is extremely difficult to deploy centralized control mechanisms in such distributed WNoT [2, 16, 17]. Eavesdropping attack, as one of typical security threats in wireless communication systems, has attracted considerable attention recently [18–24] since many adversary attacks oſten follow the eavesdropping activity, for example, the man-in-the-middle attack [25] and the hear- and-fire attack [19]. Figure 1 shows a typical example of eavesdropping attacks in a warehouse environment, where each product is attached with an RFID tag, which can passively communicate with Hindawi Publishing Corporation Mobile Information Systems Volume 2016, Article ID 4313475, 10 pages http://dx.doi.org/10.1155/2016/4313475

Transcript of Research Article An Analytical Study on Eavesdropping...

Page 1: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Research ArticleAn Analytical Study on Eavesdropping Attacks inWireless Nets of Things

Xuran Li1 Hao Wang2 Hong-Ning Dai1 Yuanyuan Wang1 and Qinglin Zhao1

1Faculty of Information Technology Macau University of Science and Technology Avenida Wai Long Room A208 Taipa Macau2Big Data Lab Faculty of Engineering and Natural Sciences Norwegian University of Science amp Technology Postboks 15176025 Alesund Norway

Correspondence should be addressed to Hong-Ning Dai hndaiieeeorg

Received 28 July 2015 Accepted 7 December 2015

Academic Editor Jong-Hyouk Lee

Copyright copy 2016 Xuran Li et alThis is an open access article distributed under the Creative Commons Attribution License whichpermits unrestricted use distribution and reproduction in any medium provided the original work is properly cited

The security of Internet of Things (IoT) has received extensive attention recently This paper presents a novel analytical modelto investigate the eavesdropping attacks in Wireless Net of Things (WNoT) Our model considers various channel conditionsincluding the path loss the shadow fading effect and Rayleigh fading effect Besides we also consider the eavesdroppers in WNoTequippedwith either omnidirectional antennas or directional antennas Extensive simulation results show that ourmodel is accurateand effective to model the eavesdropping attacks in WNoT Besides our results also indicate that the probability of eavesdroppingattacks heavily depends on the shadow fading effect the path loss effect Rayleigh fading effect and the antenna models Inparticular we find that the shadow fading effect is beneficial to the eavesdropping attacks while both the path loss effect andRayleigh fading effect are detrimental Besides using directional antennas at eavesdroppers can also increase the eavesdroppingprobability Our results offer some useful implications on designing antieavesdropping schemes in WNoT

1 Introduction

As one of the most promising information and communica-tion technologies (ICT) IoT has received extensive attentionsfrom both academia and industry recently The basic idea ofIoT is to integrate ldquosmartrdquo objects the things into the Internetwith provision of various services to users [1 2] The typicalkiller applications of IoT include the logistic managementwith RFID technology [3] environmental monitoring withwireless sensor networks [4] smart homes [5] e-health[6] smart grids [7] Maritime Industry [8] and so forthThere are a number of diverse smart objects ranging fromsmall Radiofrequency Identification (RFID) tags to sensorsactuators mobile phones smart appliances smart metersand so forth Due to the device heterogeneity variouswirelesscommunication technologies (such as ISOIEC 18000 [3]IEEE 802154 [9] and Bluetooth [10]) are also exploited tointerconnect the smart devices to form a Wireless Net ofThings (WNoT) Note that the conventional wired commu-nication technologies (Ethernets fiber-optic communication

etc) are also mandatory to connect the WNoT with the restof the Internet

Security is one of the fundamental issues in IoT since itis the prerequisite for most IoT applications [11ndash14] Thereraise a number of security threats in IoT especially inWNoTwhere the conventional security countermeasures used inwired networks may not work well in WNoT due to thefollowing inherent constraints of WNoT (i) the wirelessmedium is open for any nodes [15] (ii) it is extremely difficultto deploy centralized control mechanisms in such distributedWNoT [2 16 17] Eavesdropping attack as one of typicalsecurity threats in wireless communication systems hasattracted considerable attention recently [18ndash24] since manyadversary attacks often follow the eavesdropping activity forexample the man-in-the-middle attack [25] and the hear-and-fire attack [19]

Figure 1 shows a typical example of eavesdropping attacksin a warehouse environment where each product is attachedwith an RFID tag which can passively communicate with

Hindawi Publishing CorporationMobile Information SystemsVolume 2016 Article ID 4313475 10 pageshttpdxdoiorg10115520164313475

2 Mobile Information Systems

RFID-reader

Eavesdropper

Eavesdropper

RFIDRFID

RFID-reader

Figure 1 An example of eavesdropping activities in WNoT where there are several eavesdroppers who are wiretapping the confidentialongoing communications between RFID tags and RFID-readers

RFID-readers In this environment the confidential com-munications between RFID-readers and RFID tags can beeasily wiretapped by eavesdroppers since it is difficult toapply antieavesdropping countermeasures (eg encryptions)in this scenario due to the limited computational capabilityand the energy-constraint of RFID tagsNote thatwe considerthe far-field wireless communications in this scenario [26]

11 Related Works Most of current studies have been con-centrated on protecting the confidential communications ofsmart objects in WNoT which are also named as good nodesin this paper Encryption is one of the most commonly usedtechniques to protect the confidential communications inwireless personal area networks [11] wireless local area net-works (eg WEP [27] WPA and WPA2 [28]) wireless cel-lular networks (eg Cellular Message Encryption Algorithm[29]) and encryption algorithms forwireless sensor networks[30] However it is infeasible to apply cryptography-basedtechniques in WNoT due to the following reasons (a) theinferior computational capability of smart objects [2] (b) thelimited battery power of smart objects (eg the passive RFIDscan only harvest the energy from the readers) [1 31] and(c) the difficulty of managing the widely distributed smartobjects in centralized manner which is the necessity for theencryption algorithms [11 32 33]

An alternate approach is either to design light-weightedencryption schemes [34] or to generate noise to limit theamount of information that can be extracted by an eavesdrop-per [35 36] However one of the most important premises ofthe above schemes is that we shall have enough knowledge ofthe channel condition of eavesdroppers as indicated in [37ndash42] which nevertheless has received little attention Besidesthe wireless channel in WNoT fluctuates from time to timeand is affected by various fading effects including the path

loss the shadowing effect and the multipath effect [43]Furthermoremost of current studies inWNoT only considerthe nodes equipped with omnidirectional antennas whichradiatereceive RF signals in all directions (ie a less efficientway to propagate RF signals) As shown in some of themost recent studies [44 45] directional antennas can beused at readers Compared with omnidirectional antennasdirectional antennas can concentrate the transmissions tosome desired directions so that the performance can befurther improved

However little attention has been paid to investigatingthe eavesdropping behaviors conducted by the eavesdroppersin WNoT which is nevertheless important for us to offerbetter protection on the confidential communications sincewe can design antieavesdropping schemeswith clearer targetsif we have a better knowledge on the eavesdroppers althoughwe conducted a preliminary study on the eavesdroppingprobability of wireless ad hoc networks in [46] But thispaper is significantly different from our previous work [46]in the following aspects (1) we are concerned with theeavesdropping activities in WNoT in this paper while theprevious paper investigated the eavesdropping attacks inwireless ad hoc networks (2) we propose a novel analyticalmodel on the eavesdropping probability in this paper wherethe channel randomness (including Rayleigh fading effectand the shadowing effects) is considered while the previouspaper only considered a simplified geometric model (3) weconduct extensive simulations to verify the accuracy of ourproposed model in this paper while the previous paper onlypresented the numerical results

12 Contributions The aforementioned issues motivate usto conduct an investigation on the eavesdropping attacks inWNoT In this paper we analyze the eavesdropping activities

Mobile Information Systems 3

Table 1 Summary of effects on eavesdropping attacks

Factors Effects on eavesdropping attacksDirectional antenna PositiveShadow fading PositivePath loss NegativeRayleigh fading Negative

conducted by eavesdroppers with consideration of variouschannel conditions and different types of antennas To thebest of our knowledge this is the first study on analyzingthe eavesdropping attacks in WNoT from the viewpoints ofeavesdroppers Ourmajor research contributions in this papercan be summarized as follows

(i) We formally establish an analytical framework toinvestigate the probability of eavesdropping attacksinWNoTwith consideration of channel randomnessIn particular we consider the path loss effect theshadow fading effect andRayleigh fading effect in ourmodel Besides we also take both omnidirectionalantennas and directional antennas into account of ouranalytical framework

(ii) Extensive simulations show that the simulationresultsmatch the analytical results indicating that ouranalytical model is accurate and effective Our resultsalso show that both the path loss effect and Rayleighfading effect are detrimental to the probability ofeavesdropping attacks while the shadow fading effectis beneficial to the eavesdropping attacks in WNoTBesides our results also indicate that using directionalantennas at eavesdroppers can significantly improvethe probability of eavesdropping attacks We summa-rize our major findings in Table 1

(iii) Our results can provide many useful implications ondesigning antieavesdropping schemes in WNoTThisis because we can provide the better protection onthe confidential communications if we have the betterknowledge about the eavesdroppers as implied in theprevious studies [37ndash42] For example we can designlight-weight encryption algorithms by exploiting theknown channel features [47 48] Besides we onlyneed to encrypt the communications in the area or thedirection that is vulnerable to eavesdropping attacksso that the security cost due to the computationalcomplexity can be greatly saved

The rest of this paper is organized as follows Section 2presents the models used in this paper We then give theanalysis on the eavesdropping attacks in Section 3 Theimpacts of channel randomness with consideration of theshadow fading effect and Rayleigh fading effect are discussedin Section 4 Finally we conclude the paper in Section 5

2 Models

In this section we present the models used in this paper (SeeNotations and Symbols section)

21 Node Distribution In this paper we assume that all thesmart objects (or nodes) are randomly distributed in a 2Darea A according to a homogeneous Poisson point processwith density 120588 We denote the number of nodes in an areaAby a random variable119873 Then the probability mass functionof119873 is given as follows

119891119873 (119899) =

(120588A)119899

119899119890minus120588A

(1)

where 120588A is the expected number of nodes in areaA

22 Channel Model We assume that all nodes use the com-mon transmission powerP

119905similar to [49]The channel gain

from a node 119894 to an eavesdropper 119895 at a distance 119903 is denotedby 120574

119894119895(119903) Thus the received power at the eavesdropper is

P119905sdot 120574119894119895(119903) The signal-to-interference-plus-noise ratio (SINR)

at the eavesdropper denoted by Λ is defined to be

Λ =P

119905sdot 120574

119894119895 (119903)

120578 + sum119873

119896 =119894P

119905sdot 120574

119896119895 (119903) (2)

where 120578 is the power of the white noise and 119873 denoted thenumber of good nodes

The transmission from node 119894 can be successfully eaves-dropped by an eavesdropper if and only if

Λ ge 120573 (3)

where120573 is theminimumsignal to interference andnoise ratioIn our analysis of eavesdropping activities we ignore the

impact of interference due to the following reasons Firstthe passive eavesdroppers in WNoT do not transmit activelyand therefore contribute nothing to the interference Secondthe interference is proved to converge when efficient MACschemes are exploited and the traffic is low in a large-scalenetwork [50 51] Thus our analytical results in this papercan be regarded as the upper bound of the eavesdroppingprobability We then have

Λ =P

119905sdot 120574

119894119895 (119903)

120578ge 120573 (4)

23 Antennas There are different types of antennas used inwireless communication systems omnidirectional antennas(named Omni in short) and directional antennas (namedDir in short) Most of conventional smart objects aretypically equipped with omnidirectional antennas whichradiatecollect radio signals intofrom all directions equallyDifferent from an omnidirectional antenna a directionalantenna can concentrate transmitting or receiving capabilityon some desired directions consequently leading to theimproved network performance To model the transmittingor receiving capability of an antenna we denote the antennagain by 119866 It is obvious that an omnidirectional antenna hasa constant antenna gain that is 119866

119900= 1 in all directions

We next give the antenna gain of a directional antennaSince it is difficult to model a realistic directional antennawith precise values of antenna gain in each direction [52] we

4 Mobile Information Systems

Directionalantenna

Main lobe120579m

Side-lobesback-lobes

Figure 2 Directional antenna model

use an approximate antenna model which was first proposedin [53] This model is also named as Keyhole due to thegeometrical analogy to the archaic keyhole in 2D planeas shown in Figure 2 In this model the sector with angle120579119898represents the main lobe of the antenna which has the

maximum gain denoted by 119866119898(where 120579

119898is also called the

antenna beamwidth) and the circular part represents theside-lobes and back-lobes with lower antenna gain denotedby 119866

119904 In particular when 119866

119898and 120579

119898are given [53 54] we

can calculate 119866119904as follows

119866119904=

2 minus 119866119898(1 minus cos (120579

1198982))

1 + cos (1205791198982)

(5)

3 Analysis on Eavesdropping Attacks

This section presents our analytical framework to modelthe eavesdropping activities in WNoT In particular we firstanalyze effective eavesdropping area in Section 31 which isthen used to derive the probability of eavesdropping attacks inSection 32 Section 33 presents the empirical results

31 Deterministic Path Loss Model We first consider that thechannel gain ismainly determined by the large-scale path losseffect [43] Thus the channel gain is given by

120574119894119895 (119903) = 119862 sdot 119866

119892sdot 119866

119890sdot1

119903120572 (6)

where119862 is a constant 119903 is the distance between the good nodeand the eavesdropper119866

119892and119866

119890are the antenna gains for the

good node and the eavesdropper respectively and 120572 is thepath loss exponent ranging from 2 to 4 [43]

As shown in Section 22 an eavesdropper can successfullywiretap a transmission if and only if itsΛ ge 120573 In other wordsthe probability of no transmission eavesdropped is given by119875(Λ lt 120573) Substituting (6) into inequality (4) and rearranging119875(Λ lt 120573) we have

119875 (Λ lt 120573) = 119875(P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 119903120572lt 120573)

= 119875(119903 gt (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

)

(7)

We then define a random variable 119877 as

119877 = (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

(8)

which is referred to the eavesdropping range of an eaves-dropper After substituting (8) into inequality (7) we have119875(Λ lt 120573) = 119875(119903 gt 119877) which implies that a transmissioncannot be eavesdropped by an eavesdropper if and only ifthe transmitter falls outside the eavesdropping range 119877 of theeavesdropper

We then analyze the effective eavesdropping area of aneavesdropper which is defined as 119864[120587119877

2] = 120587119864[1198772] where119864[1198772] is the second moment of the eavesdropping range 119877The effective eavesdropping area is a critical region that onlywhen the good node falls in this region its transmission canbe eavesdropped by eavesdroppers We then have

119864 [1205871198772] = 120587119864[(

119862 sdotP119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

] (9)

32 Probability of Eavesdropping Attacks We model thesuccessful chance of eavesdropping attacks by the probabilityof eavesdropping attacks denoted by 119875(119864) To derive 119875(119864) weneed to analyze the probability of no good node being eaves-dropped first We denote the number of good nodes falling inthe eavesdropping area by a random variable 119884 Since goodnodes are randomly distributed according to a homogeneousPoisson point process (as shown in Section 21) we then havethe probability of no good node falling in the eavesdroppingarea which is given by the following equation

119875 (119884 = 0) = 119890minus120588sdot119864[120587119877

2] (10)

We then can calculate 119875(119864) as follows

119875 (119864) = 1 minus 119875 (119884 = 0) = 1 minus 119890minus120588sdot119864[120587119877

2] (11)

After substituting 119864[1205871198772] in (11) by Right-Hand Side

(RHS) of (9) we have

119875 (119864) = 1

minus exp(minus120588 sdot 120587119864[(119862 sdotP

119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

]) (12)

The physical meaning of 119875(119864) is the probability that aneavesdropper can successfully eavesdrop at least one trans-mission in WNoT Besides as shown in (12) the probabilityof eavesdropping attacks heavily depends on the path losseffect Note that thismodel can be extended to amore generalcase with consideration of the shadow fading effect and theRayleigh fading effect which will be analyzed in Section 4

33 Empirical Results We conduct extensive simulations toverify the effectiveness and the accuracy of our proposedmodel In our simulations the probability of eavesdroppingattacks in a WNoT is calculated by

1198751015840(119864) =

Ψ

Ω (13)

Mobile Information Systems 5

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 3 Probability of eavesdropping attacks 119875(119864) with path losseffect only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

where Ω and Ψ denote the number of total WNoT topolo-gies and the number of WNoT topologies that have beeneavesdropped respectively We say that a WNoT topology iseavesdropped when any smart object (node) in this topologyis eavesdropped Note that we denote the simulation resultsby 119875

1015840(119864) in order to differentiate it from the analyticalvalue 119875(119864) To minimize the impacts of the border effectswe conduct the simulations within an 119897 times 119897 area with theexclusion of the nodes falling in the outer box 1198971015840 times 1198971015840 where1198971015840 shall be significantly larger than 119897 [55] Note that 119897 ischosen as 3000m in our simulations We fix the numberof eavesdroppers and choose the node density 120588 for thegood nodes ranging from 10minus5 to 10minus1 The other systemparameters are selected as follows 119862 = 10 P

119905= 1mWatt

120578 = 001mWatt and 120573 = 10 dB We consider eavesdroppersequipped with either omnidirectional antenna (Omni) ordirectional antenna (Dir) while the good nodes are equippedwith omnidirectional antennas only

Figure 3 shows both the analytical results and the simu-lation results of the probability of eavesdropping attacks withthe path loss effect onlyThe curves and themarkers representthe analytical results and simulation results respectivelyIt is shown in Figure 3 that the simulation results have agood agreement with the analytical results implying that ourmodel is quite accurate

As shown in Figure 3 we also find that the probability ofeavesdropping attacks decreases with the increased path lossexponent 120572 implying that the path loss effect has the negativeimpact on eavesdropping attacks Besides we also find thatusing directional antennas at eavesdroppers can increase theprobability of eavesdropping attacks although this effect is notthat significant when the path loss effect is increased (eg 120572 =

35)

4 Impacts of Channel Randomness onEavesdropping Attacks

In this section we extend our analytical model in Section 3to more general cases in consideration of two different effectsof channel randomness (1) shadow fading effect and (2)

Rayleigh fading effect which will be presented in Sections41 and 42 respectively We then give the empirical resultsin Section 43

In order to model the two random effects we introducethe packet eavesdropping probability denoted by 119875

119864|Λ(119910)

which is defined as the probability that a packet is successfullyeavesdropped by an eavesdropper when the average signal-to-interference-noise ratio Λ = 119910

We then extend the analysis of eavesdropping range inSection 31 with consideration of the packet eavesdroppingprobability 119875

119864|Λ(119910) We first consider the case that the packet

eavesdropping probability 119875119864|Λ

(119910) tends to approach a stepfunction if good long code is used [56] In particular we havethe cumulative distribution function (CDF) of eavesdroppingrange 119877 which is defined as follows

119865119877 (119903) = 119875 [Λ (119903) lt 120573] = 119865

119877(

120578 sdot 120573

P119905sdot 119866

119892sdot 119866

119890

) (14)

In amore general casewhen119875119864|Λ

(119910) is not a step functionthe cumulative distribution function is

119865119877 (119903) = 1 minus int

+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)119875119864|Λ (119909) d119909 (15)

where 119891119877is the probability density function (PDF) of 119877

41 Shadow Fading Effect Following the similar approach[51] we can derive the probability density function of 119877 withconsideration of the shadow fading effect as follows

119891119877 (119909) =

1

radic2120587120590119909

sdot exp(minus1

2(ln119909 minus ln (119862 sdot 119903

minus120572)

120590)

2

)

(16)

where 119903 is the distance between a good node and aneavesdropper and 120590 is the standard deviation of the Gaussiandistribution describing the shadow fading effect

We then have the second moment of random variable 119877

given as follows

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903 (17)

After substituting [1 minus 119865119897(120578120573P

119905119860119866)] in (17) with RHS of

(15) and RHS of (16) (note that 119875119864|Λ

(119886) = 1) we finally have

119864 [1198772] = int

+infin

0

2119903int+infin

120578120573P119905119860119866

1

radic2120587120590119886

sdot 119890minus(12)((ln 119886minusln(119862sdot119903minus120572))120590)2d119886 d119903

(18)

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 2: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

2 Mobile Information Systems

RFID-reader

Eavesdropper

Eavesdropper

RFIDRFID

RFID-reader

Figure 1 An example of eavesdropping activities in WNoT where there are several eavesdroppers who are wiretapping the confidentialongoing communications between RFID tags and RFID-readers

RFID-readers In this environment the confidential com-munications between RFID-readers and RFID tags can beeasily wiretapped by eavesdroppers since it is difficult toapply antieavesdropping countermeasures (eg encryptions)in this scenario due to the limited computational capabilityand the energy-constraint of RFID tagsNote thatwe considerthe far-field wireless communications in this scenario [26]

11 Related Works Most of current studies have been con-centrated on protecting the confidential communications ofsmart objects in WNoT which are also named as good nodesin this paper Encryption is one of the most commonly usedtechniques to protect the confidential communications inwireless personal area networks [11] wireless local area net-works (eg WEP [27] WPA and WPA2 [28]) wireless cel-lular networks (eg Cellular Message Encryption Algorithm[29]) and encryption algorithms forwireless sensor networks[30] However it is infeasible to apply cryptography-basedtechniques in WNoT due to the following reasons (a) theinferior computational capability of smart objects [2] (b) thelimited battery power of smart objects (eg the passive RFIDscan only harvest the energy from the readers) [1 31] and(c) the difficulty of managing the widely distributed smartobjects in centralized manner which is the necessity for theencryption algorithms [11 32 33]

An alternate approach is either to design light-weightedencryption schemes [34] or to generate noise to limit theamount of information that can be extracted by an eavesdrop-per [35 36] However one of the most important premises ofthe above schemes is that we shall have enough knowledge ofthe channel condition of eavesdroppers as indicated in [37ndash42] which nevertheless has received little attention Besidesthe wireless channel in WNoT fluctuates from time to timeand is affected by various fading effects including the path

loss the shadowing effect and the multipath effect [43]Furthermoremost of current studies inWNoT only considerthe nodes equipped with omnidirectional antennas whichradiatereceive RF signals in all directions (ie a less efficientway to propagate RF signals) As shown in some of themost recent studies [44 45] directional antennas can beused at readers Compared with omnidirectional antennasdirectional antennas can concentrate the transmissions tosome desired directions so that the performance can befurther improved

However little attention has been paid to investigatingthe eavesdropping behaviors conducted by the eavesdroppersin WNoT which is nevertheless important for us to offerbetter protection on the confidential communications sincewe can design antieavesdropping schemeswith clearer targetsif we have a better knowledge on the eavesdroppers althoughwe conducted a preliminary study on the eavesdroppingprobability of wireless ad hoc networks in [46] But thispaper is significantly different from our previous work [46]in the following aspects (1) we are concerned with theeavesdropping activities in WNoT in this paper while theprevious paper investigated the eavesdropping attacks inwireless ad hoc networks (2) we propose a novel analyticalmodel on the eavesdropping probability in this paper wherethe channel randomness (including Rayleigh fading effectand the shadowing effects) is considered while the previouspaper only considered a simplified geometric model (3) weconduct extensive simulations to verify the accuracy of ourproposed model in this paper while the previous paper onlypresented the numerical results

12 Contributions The aforementioned issues motivate usto conduct an investigation on the eavesdropping attacks inWNoT In this paper we analyze the eavesdropping activities

Mobile Information Systems 3

Table 1 Summary of effects on eavesdropping attacks

Factors Effects on eavesdropping attacksDirectional antenna PositiveShadow fading PositivePath loss NegativeRayleigh fading Negative

conducted by eavesdroppers with consideration of variouschannel conditions and different types of antennas To thebest of our knowledge this is the first study on analyzingthe eavesdropping attacks in WNoT from the viewpoints ofeavesdroppers Ourmajor research contributions in this papercan be summarized as follows

(i) We formally establish an analytical framework toinvestigate the probability of eavesdropping attacksinWNoTwith consideration of channel randomnessIn particular we consider the path loss effect theshadow fading effect andRayleigh fading effect in ourmodel Besides we also take both omnidirectionalantennas and directional antennas into account of ouranalytical framework

(ii) Extensive simulations show that the simulationresultsmatch the analytical results indicating that ouranalytical model is accurate and effective Our resultsalso show that both the path loss effect and Rayleighfading effect are detrimental to the probability ofeavesdropping attacks while the shadow fading effectis beneficial to the eavesdropping attacks in WNoTBesides our results also indicate that using directionalantennas at eavesdroppers can significantly improvethe probability of eavesdropping attacks We summa-rize our major findings in Table 1

(iii) Our results can provide many useful implications ondesigning antieavesdropping schemes in WNoTThisis because we can provide the better protection onthe confidential communications if we have the betterknowledge about the eavesdroppers as implied in theprevious studies [37ndash42] For example we can designlight-weight encryption algorithms by exploiting theknown channel features [47 48] Besides we onlyneed to encrypt the communications in the area or thedirection that is vulnerable to eavesdropping attacksso that the security cost due to the computationalcomplexity can be greatly saved

The rest of this paper is organized as follows Section 2presents the models used in this paper We then give theanalysis on the eavesdropping attacks in Section 3 Theimpacts of channel randomness with consideration of theshadow fading effect and Rayleigh fading effect are discussedin Section 4 Finally we conclude the paper in Section 5

2 Models

In this section we present the models used in this paper (SeeNotations and Symbols section)

21 Node Distribution In this paper we assume that all thesmart objects (or nodes) are randomly distributed in a 2Darea A according to a homogeneous Poisson point processwith density 120588 We denote the number of nodes in an areaAby a random variable119873 Then the probability mass functionof119873 is given as follows

119891119873 (119899) =

(120588A)119899

119899119890minus120588A

(1)

where 120588A is the expected number of nodes in areaA

22 Channel Model We assume that all nodes use the com-mon transmission powerP

119905similar to [49]The channel gain

from a node 119894 to an eavesdropper 119895 at a distance 119903 is denotedby 120574

119894119895(119903) Thus the received power at the eavesdropper is

P119905sdot 120574119894119895(119903) The signal-to-interference-plus-noise ratio (SINR)

at the eavesdropper denoted by Λ is defined to be

Λ =P

119905sdot 120574

119894119895 (119903)

120578 + sum119873

119896 =119894P

119905sdot 120574

119896119895 (119903) (2)

where 120578 is the power of the white noise and 119873 denoted thenumber of good nodes

The transmission from node 119894 can be successfully eaves-dropped by an eavesdropper if and only if

Λ ge 120573 (3)

where120573 is theminimumsignal to interference andnoise ratioIn our analysis of eavesdropping activities we ignore the

impact of interference due to the following reasons Firstthe passive eavesdroppers in WNoT do not transmit activelyand therefore contribute nothing to the interference Secondthe interference is proved to converge when efficient MACschemes are exploited and the traffic is low in a large-scalenetwork [50 51] Thus our analytical results in this papercan be regarded as the upper bound of the eavesdroppingprobability We then have

Λ =P

119905sdot 120574

119894119895 (119903)

120578ge 120573 (4)

23 Antennas There are different types of antennas used inwireless communication systems omnidirectional antennas(named Omni in short) and directional antennas (namedDir in short) Most of conventional smart objects aretypically equipped with omnidirectional antennas whichradiatecollect radio signals intofrom all directions equallyDifferent from an omnidirectional antenna a directionalantenna can concentrate transmitting or receiving capabilityon some desired directions consequently leading to theimproved network performance To model the transmittingor receiving capability of an antenna we denote the antennagain by 119866 It is obvious that an omnidirectional antenna hasa constant antenna gain that is 119866

119900= 1 in all directions

We next give the antenna gain of a directional antennaSince it is difficult to model a realistic directional antennawith precise values of antenna gain in each direction [52] we

4 Mobile Information Systems

Directionalantenna

Main lobe120579m

Side-lobesback-lobes

Figure 2 Directional antenna model

use an approximate antenna model which was first proposedin [53] This model is also named as Keyhole due to thegeometrical analogy to the archaic keyhole in 2D planeas shown in Figure 2 In this model the sector with angle120579119898represents the main lobe of the antenna which has the

maximum gain denoted by 119866119898(where 120579

119898is also called the

antenna beamwidth) and the circular part represents theside-lobes and back-lobes with lower antenna gain denotedby 119866

119904 In particular when 119866

119898and 120579

119898are given [53 54] we

can calculate 119866119904as follows

119866119904=

2 minus 119866119898(1 minus cos (120579

1198982))

1 + cos (1205791198982)

(5)

3 Analysis on Eavesdropping Attacks

This section presents our analytical framework to modelthe eavesdropping activities in WNoT In particular we firstanalyze effective eavesdropping area in Section 31 which isthen used to derive the probability of eavesdropping attacks inSection 32 Section 33 presents the empirical results

31 Deterministic Path Loss Model We first consider that thechannel gain ismainly determined by the large-scale path losseffect [43] Thus the channel gain is given by

120574119894119895 (119903) = 119862 sdot 119866

119892sdot 119866

119890sdot1

119903120572 (6)

where119862 is a constant 119903 is the distance between the good nodeand the eavesdropper119866

119892and119866

119890are the antenna gains for the

good node and the eavesdropper respectively and 120572 is thepath loss exponent ranging from 2 to 4 [43]

As shown in Section 22 an eavesdropper can successfullywiretap a transmission if and only if itsΛ ge 120573 In other wordsthe probability of no transmission eavesdropped is given by119875(Λ lt 120573) Substituting (6) into inequality (4) and rearranging119875(Λ lt 120573) we have

119875 (Λ lt 120573) = 119875(P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 119903120572lt 120573)

= 119875(119903 gt (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

)

(7)

We then define a random variable 119877 as

119877 = (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

(8)

which is referred to the eavesdropping range of an eaves-dropper After substituting (8) into inequality (7) we have119875(Λ lt 120573) = 119875(119903 gt 119877) which implies that a transmissioncannot be eavesdropped by an eavesdropper if and only ifthe transmitter falls outside the eavesdropping range 119877 of theeavesdropper

We then analyze the effective eavesdropping area of aneavesdropper which is defined as 119864[120587119877

2] = 120587119864[1198772] where119864[1198772] is the second moment of the eavesdropping range 119877The effective eavesdropping area is a critical region that onlywhen the good node falls in this region its transmission canbe eavesdropped by eavesdroppers We then have

119864 [1205871198772] = 120587119864[(

119862 sdotP119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

] (9)

32 Probability of Eavesdropping Attacks We model thesuccessful chance of eavesdropping attacks by the probabilityof eavesdropping attacks denoted by 119875(119864) To derive 119875(119864) weneed to analyze the probability of no good node being eaves-dropped first We denote the number of good nodes falling inthe eavesdropping area by a random variable 119884 Since goodnodes are randomly distributed according to a homogeneousPoisson point process (as shown in Section 21) we then havethe probability of no good node falling in the eavesdroppingarea which is given by the following equation

119875 (119884 = 0) = 119890minus120588sdot119864[120587119877

2] (10)

We then can calculate 119875(119864) as follows

119875 (119864) = 1 minus 119875 (119884 = 0) = 1 minus 119890minus120588sdot119864[120587119877

2] (11)

After substituting 119864[1205871198772] in (11) by Right-Hand Side

(RHS) of (9) we have

119875 (119864) = 1

minus exp(minus120588 sdot 120587119864[(119862 sdotP

119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

]) (12)

The physical meaning of 119875(119864) is the probability that aneavesdropper can successfully eavesdrop at least one trans-mission in WNoT Besides as shown in (12) the probabilityof eavesdropping attacks heavily depends on the path losseffect Note that thismodel can be extended to amore generalcase with consideration of the shadow fading effect and theRayleigh fading effect which will be analyzed in Section 4

33 Empirical Results We conduct extensive simulations toverify the effectiveness and the accuracy of our proposedmodel In our simulations the probability of eavesdroppingattacks in a WNoT is calculated by

1198751015840(119864) =

Ψ

Ω (13)

Mobile Information Systems 5

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 3 Probability of eavesdropping attacks 119875(119864) with path losseffect only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

where Ω and Ψ denote the number of total WNoT topolo-gies and the number of WNoT topologies that have beeneavesdropped respectively We say that a WNoT topology iseavesdropped when any smart object (node) in this topologyis eavesdropped Note that we denote the simulation resultsby 119875

1015840(119864) in order to differentiate it from the analyticalvalue 119875(119864) To minimize the impacts of the border effectswe conduct the simulations within an 119897 times 119897 area with theexclusion of the nodes falling in the outer box 1198971015840 times 1198971015840 where1198971015840 shall be significantly larger than 119897 [55] Note that 119897 ischosen as 3000m in our simulations We fix the numberof eavesdroppers and choose the node density 120588 for thegood nodes ranging from 10minus5 to 10minus1 The other systemparameters are selected as follows 119862 = 10 P

119905= 1mWatt

120578 = 001mWatt and 120573 = 10 dB We consider eavesdroppersequipped with either omnidirectional antenna (Omni) ordirectional antenna (Dir) while the good nodes are equippedwith omnidirectional antennas only

Figure 3 shows both the analytical results and the simu-lation results of the probability of eavesdropping attacks withthe path loss effect onlyThe curves and themarkers representthe analytical results and simulation results respectivelyIt is shown in Figure 3 that the simulation results have agood agreement with the analytical results implying that ourmodel is quite accurate

As shown in Figure 3 we also find that the probability ofeavesdropping attacks decreases with the increased path lossexponent 120572 implying that the path loss effect has the negativeimpact on eavesdropping attacks Besides we also find thatusing directional antennas at eavesdroppers can increase theprobability of eavesdropping attacks although this effect is notthat significant when the path loss effect is increased (eg 120572 =

35)

4 Impacts of Channel Randomness onEavesdropping Attacks

In this section we extend our analytical model in Section 3to more general cases in consideration of two different effectsof channel randomness (1) shadow fading effect and (2)

Rayleigh fading effect which will be presented in Sections41 and 42 respectively We then give the empirical resultsin Section 43

In order to model the two random effects we introducethe packet eavesdropping probability denoted by 119875

119864|Λ(119910)

which is defined as the probability that a packet is successfullyeavesdropped by an eavesdropper when the average signal-to-interference-noise ratio Λ = 119910

We then extend the analysis of eavesdropping range inSection 31 with consideration of the packet eavesdroppingprobability 119875

119864|Λ(119910) We first consider the case that the packet

eavesdropping probability 119875119864|Λ

(119910) tends to approach a stepfunction if good long code is used [56] In particular we havethe cumulative distribution function (CDF) of eavesdroppingrange 119877 which is defined as follows

119865119877 (119903) = 119875 [Λ (119903) lt 120573] = 119865

119877(

120578 sdot 120573

P119905sdot 119866

119892sdot 119866

119890

) (14)

In amore general casewhen119875119864|Λ

(119910) is not a step functionthe cumulative distribution function is

119865119877 (119903) = 1 minus int

+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)119875119864|Λ (119909) d119909 (15)

where 119891119877is the probability density function (PDF) of 119877

41 Shadow Fading Effect Following the similar approach[51] we can derive the probability density function of 119877 withconsideration of the shadow fading effect as follows

119891119877 (119909) =

1

radic2120587120590119909

sdot exp(minus1

2(ln119909 minus ln (119862 sdot 119903

minus120572)

120590)

2

)

(16)

where 119903 is the distance between a good node and aneavesdropper and 120590 is the standard deviation of the Gaussiandistribution describing the shadow fading effect

We then have the second moment of random variable 119877

given as follows

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903 (17)

After substituting [1 minus 119865119897(120578120573P

119905119860119866)] in (17) with RHS of

(15) and RHS of (16) (note that 119875119864|Λ

(119886) = 1) we finally have

119864 [1198772] = int

+infin

0

2119903int+infin

120578120573P119905119860119866

1

radic2120587120590119886

sdot 119890minus(12)((ln 119886minusln(119862sdot119903minus120572))120590)2d119886 d119903

(18)

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 3: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Mobile Information Systems 3

Table 1 Summary of effects on eavesdropping attacks

Factors Effects on eavesdropping attacksDirectional antenna PositiveShadow fading PositivePath loss NegativeRayleigh fading Negative

conducted by eavesdroppers with consideration of variouschannel conditions and different types of antennas To thebest of our knowledge this is the first study on analyzingthe eavesdropping attacks in WNoT from the viewpoints ofeavesdroppers Ourmajor research contributions in this papercan be summarized as follows

(i) We formally establish an analytical framework toinvestigate the probability of eavesdropping attacksinWNoTwith consideration of channel randomnessIn particular we consider the path loss effect theshadow fading effect andRayleigh fading effect in ourmodel Besides we also take both omnidirectionalantennas and directional antennas into account of ouranalytical framework

(ii) Extensive simulations show that the simulationresultsmatch the analytical results indicating that ouranalytical model is accurate and effective Our resultsalso show that both the path loss effect and Rayleighfading effect are detrimental to the probability ofeavesdropping attacks while the shadow fading effectis beneficial to the eavesdropping attacks in WNoTBesides our results also indicate that using directionalantennas at eavesdroppers can significantly improvethe probability of eavesdropping attacks We summa-rize our major findings in Table 1

(iii) Our results can provide many useful implications ondesigning antieavesdropping schemes in WNoTThisis because we can provide the better protection onthe confidential communications if we have the betterknowledge about the eavesdroppers as implied in theprevious studies [37ndash42] For example we can designlight-weight encryption algorithms by exploiting theknown channel features [47 48] Besides we onlyneed to encrypt the communications in the area or thedirection that is vulnerable to eavesdropping attacksso that the security cost due to the computationalcomplexity can be greatly saved

The rest of this paper is organized as follows Section 2presents the models used in this paper We then give theanalysis on the eavesdropping attacks in Section 3 Theimpacts of channel randomness with consideration of theshadow fading effect and Rayleigh fading effect are discussedin Section 4 Finally we conclude the paper in Section 5

2 Models

In this section we present the models used in this paper (SeeNotations and Symbols section)

21 Node Distribution In this paper we assume that all thesmart objects (or nodes) are randomly distributed in a 2Darea A according to a homogeneous Poisson point processwith density 120588 We denote the number of nodes in an areaAby a random variable119873 Then the probability mass functionof119873 is given as follows

119891119873 (119899) =

(120588A)119899

119899119890minus120588A

(1)

where 120588A is the expected number of nodes in areaA

22 Channel Model We assume that all nodes use the com-mon transmission powerP

119905similar to [49]The channel gain

from a node 119894 to an eavesdropper 119895 at a distance 119903 is denotedby 120574

119894119895(119903) Thus the received power at the eavesdropper is

P119905sdot 120574119894119895(119903) The signal-to-interference-plus-noise ratio (SINR)

at the eavesdropper denoted by Λ is defined to be

Λ =P

119905sdot 120574

119894119895 (119903)

120578 + sum119873

119896 =119894P

119905sdot 120574

119896119895 (119903) (2)

where 120578 is the power of the white noise and 119873 denoted thenumber of good nodes

The transmission from node 119894 can be successfully eaves-dropped by an eavesdropper if and only if

Λ ge 120573 (3)

where120573 is theminimumsignal to interference andnoise ratioIn our analysis of eavesdropping activities we ignore the

impact of interference due to the following reasons Firstthe passive eavesdroppers in WNoT do not transmit activelyand therefore contribute nothing to the interference Secondthe interference is proved to converge when efficient MACschemes are exploited and the traffic is low in a large-scalenetwork [50 51] Thus our analytical results in this papercan be regarded as the upper bound of the eavesdroppingprobability We then have

Λ =P

119905sdot 120574

119894119895 (119903)

120578ge 120573 (4)

23 Antennas There are different types of antennas used inwireless communication systems omnidirectional antennas(named Omni in short) and directional antennas (namedDir in short) Most of conventional smart objects aretypically equipped with omnidirectional antennas whichradiatecollect radio signals intofrom all directions equallyDifferent from an omnidirectional antenna a directionalantenna can concentrate transmitting or receiving capabilityon some desired directions consequently leading to theimproved network performance To model the transmittingor receiving capability of an antenna we denote the antennagain by 119866 It is obvious that an omnidirectional antenna hasa constant antenna gain that is 119866

119900= 1 in all directions

We next give the antenna gain of a directional antennaSince it is difficult to model a realistic directional antennawith precise values of antenna gain in each direction [52] we

4 Mobile Information Systems

Directionalantenna

Main lobe120579m

Side-lobesback-lobes

Figure 2 Directional antenna model

use an approximate antenna model which was first proposedin [53] This model is also named as Keyhole due to thegeometrical analogy to the archaic keyhole in 2D planeas shown in Figure 2 In this model the sector with angle120579119898represents the main lobe of the antenna which has the

maximum gain denoted by 119866119898(where 120579

119898is also called the

antenna beamwidth) and the circular part represents theside-lobes and back-lobes with lower antenna gain denotedby 119866

119904 In particular when 119866

119898and 120579

119898are given [53 54] we

can calculate 119866119904as follows

119866119904=

2 minus 119866119898(1 minus cos (120579

1198982))

1 + cos (1205791198982)

(5)

3 Analysis on Eavesdropping Attacks

This section presents our analytical framework to modelthe eavesdropping activities in WNoT In particular we firstanalyze effective eavesdropping area in Section 31 which isthen used to derive the probability of eavesdropping attacks inSection 32 Section 33 presents the empirical results

31 Deterministic Path Loss Model We first consider that thechannel gain ismainly determined by the large-scale path losseffect [43] Thus the channel gain is given by

120574119894119895 (119903) = 119862 sdot 119866

119892sdot 119866

119890sdot1

119903120572 (6)

where119862 is a constant 119903 is the distance between the good nodeand the eavesdropper119866

119892and119866

119890are the antenna gains for the

good node and the eavesdropper respectively and 120572 is thepath loss exponent ranging from 2 to 4 [43]

As shown in Section 22 an eavesdropper can successfullywiretap a transmission if and only if itsΛ ge 120573 In other wordsthe probability of no transmission eavesdropped is given by119875(Λ lt 120573) Substituting (6) into inequality (4) and rearranging119875(Λ lt 120573) we have

119875 (Λ lt 120573) = 119875(P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 119903120572lt 120573)

= 119875(119903 gt (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

)

(7)

We then define a random variable 119877 as

119877 = (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

(8)

which is referred to the eavesdropping range of an eaves-dropper After substituting (8) into inequality (7) we have119875(Λ lt 120573) = 119875(119903 gt 119877) which implies that a transmissioncannot be eavesdropped by an eavesdropper if and only ifthe transmitter falls outside the eavesdropping range 119877 of theeavesdropper

We then analyze the effective eavesdropping area of aneavesdropper which is defined as 119864[120587119877

2] = 120587119864[1198772] where119864[1198772] is the second moment of the eavesdropping range 119877The effective eavesdropping area is a critical region that onlywhen the good node falls in this region its transmission canbe eavesdropped by eavesdroppers We then have

119864 [1205871198772] = 120587119864[(

119862 sdotP119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

] (9)

32 Probability of Eavesdropping Attacks We model thesuccessful chance of eavesdropping attacks by the probabilityof eavesdropping attacks denoted by 119875(119864) To derive 119875(119864) weneed to analyze the probability of no good node being eaves-dropped first We denote the number of good nodes falling inthe eavesdropping area by a random variable 119884 Since goodnodes are randomly distributed according to a homogeneousPoisson point process (as shown in Section 21) we then havethe probability of no good node falling in the eavesdroppingarea which is given by the following equation

119875 (119884 = 0) = 119890minus120588sdot119864[120587119877

2] (10)

We then can calculate 119875(119864) as follows

119875 (119864) = 1 minus 119875 (119884 = 0) = 1 minus 119890minus120588sdot119864[120587119877

2] (11)

After substituting 119864[1205871198772] in (11) by Right-Hand Side

(RHS) of (9) we have

119875 (119864) = 1

minus exp(minus120588 sdot 120587119864[(119862 sdotP

119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

]) (12)

The physical meaning of 119875(119864) is the probability that aneavesdropper can successfully eavesdrop at least one trans-mission in WNoT Besides as shown in (12) the probabilityof eavesdropping attacks heavily depends on the path losseffect Note that thismodel can be extended to amore generalcase with consideration of the shadow fading effect and theRayleigh fading effect which will be analyzed in Section 4

33 Empirical Results We conduct extensive simulations toverify the effectiveness and the accuracy of our proposedmodel In our simulations the probability of eavesdroppingattacks in a WNoT is calculated by

1198751015840(119864) =

Ψ

Ω (13)

Mobile Information Systems 5

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 3 Probability of eavesdropping attacks 119875(119864) with path losseffect only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

where Ω and Ψ denote the number of total WNoT topolo-gies and the number of WNoT topologies that have beeneavesdropped respectively We say that a WNoT topology iseavesdropped when any smart object (node) in this topologyis eavesdropped Note that we denote the simulation resultsby 119875

1015840(119864) in order to differentiate it from the analyticalvalue 119875(119864) To minimize the impacts of the border effectswe conduct the simulations within an 119897 times 119897 area with theexclusion of the nodes falling in the outer box 1198971015840 times 1198971015840 where1198971015840 shall be significantly larger than 119897 [55] Note that 119897 ischosen as 3000m in our simulations We fix the numberof eavesdroppers and choose the node density 120588 for thegood nodes ranging from 10minus5 to 10minus1 The other systemparameters are selected as follows 119862 = 10 P

119905= 1mWatt

120578 = 001mWatt and 120573 = 10 dB We consider eavesdroppersequipped with either omnidirectional antenna (Omni) ordirectional antenna (Dir) while the good nodes are equippedwith omnidirectional antennas only

Figure 3 shows both the analytical results and the simu-lation results of the probability of eavesdropping attacks withthe path loss effect onlyThe curves and themarkers representthe analytical results and simulation results respectivelyIt is shown in Figure 3 that the simulation results have agood agreement with the analytical results implying that ourmodel is quite accurate

As shown in Figure 3 we also find that the probability ofeavesdropping attacks decreases with the increased path lossexponent 120572 implying that the path loss effect has the negativeimpact on eavesdropping attacks Besides we also find thatusing directional antennas at eavesdroppers can increase theprobability of eavesdropping attacks although this effect is notthat significant when the path loss effect is increased (eg 120572 =

35)

4 Impacts of Channel Randomness onEavesdropping Attacks

In this section we extend our analytical model in Section 3to more general cases in consideration of two different effectsof channel randomness (1) shadow fading effect and (2)

Rayleigh fading effect which will be presented in Sections41 and 42 respectively We then give the empirical resultsin Section 43

In order to model the two random effects we introducethe packet eavesdropping probability denoted by 119875

119864|Λ(119910)

which is defined as the probability that a packet is successfullyeavesdropped by an eavesdropper when the average signal-to-interference-noise ratio Λ = 119910

We then extend the analysis of eavesdropping range inSection 31 with consideration of the packet eavesdroppingprobability 119875

119864|Λ(119910) We first consider the case that the packet

eavesdropping probability 119875119864|Λ

(119910) tends to approach a stepfunction if good long code is used [56] In particular we havethe cumulative distribution function (CDF) of eavesdroppingrange 119877 which is defined as follows

119865119877 (119903) = 119875 [Λ (119903) lt 120573] = 119865

119877(

120578 sdot 120573

P119905sdot 119866

119892sdot 119866

119890

) (14)

In amore general casewhen119875119864|Λ

(119910) is not a step functionthe cumulative distribution function is

119865119877 (119903) = 1 minus int

+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)119875119864|Λ (119909) d119909 (15)

where 119891119877is the probability density function (PDF) of 119877

41 Shadow Fading Effect Following the similar approach[51] we can derive the probability density function of 119877 withconsideration of the shadow fading effect as follows

119891119877 (119909) =

1

radic2120587120590119909

sdot exp(minus1

2(ln119909 minus ln (119862 sdot 119903

minus120572)

120590)

2

)

(16)

where 119903 is the distance between a good node and aneavesdropper and 120590 is the standard deviation of the Gaussiandistribution describing the shadow fading effect

We then have the second moment of random variable 119877

given as follows

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903 (17)

After substituting [1 minus 119865119897(120578120573P

119905119860119866)] in (17) with RHS of

(15) and RHS of (16) (note that 119875119864|Λ

(119886) = 1) we finally have

119864 [1198772] = int

+infin

0

2119903int+infin

120578120573P119905119860119866

1

radic2120587120590119886

sdot 119890minus(12)((ln 119886minusln(119862sdot119903minus120572))120590)2d119886 d119903

(18)

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 4: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

4 Mobile Information Systems

Directionalantenna

Main lobe120579m

Side-lobesback-lobes

Figure 2 Directional antenna model

use an approximate antenna model which was first proposedin [53] This model is also named as Keyhole due to thegeometrical analogy to the archaic keyhole in 2D planeas shown in Figure 2 In this model the sector with angle120579119898represents the main lobe of the antenna which has the

maximum gain denoted by 119866119898(where 120579

119898is also called the

antenna beamwidth) and the circular part represents theside-lobes and back-lobes with lower antenna gain denotedby 119866

119904 In particular when 119866

119898and 120579

119898are given [53 54] we

can calculate 119866119904as follows

119866119904=

2 minus 119866119898(1 minus cos (120579

1198982))

1 + cos (1205791198982)

(5)

3 Analysis on Eavesdropping Attacks

This section presents our analytical framework to modelthe eavesdropping activities in WNoT In particular we firstanalyze effective eavesdropping area in Section 31 which isthen used to derive the probability of eavesdropping attacks inSection 32 Section 33 presents the empirical results

31 Deterministic Path Loss Model We first consider that thechannel gain ismainly determined by the large-scale path losseffect [43] Thus the channel gain is given by

120574119894119895 (119903) = 119862 sdot 119866

119892sdot 119866

119890sdot1

119903120572 (6)

where119862 is a constant 119903 is the distance between the good nodeand the eavesdropper119866

119892and119866

119890are the antenna gains for the

good node and the eavesdropper respectively and 120572 is thepath loss exponent ranging from 2 to 4 [43]

As shown in Section 22 an eavesdropper can successfullywiretap a transmission if and only if itsΛ ge 120573 In other wordsthe probability of no transmission eavesdropped is given by119875(Λ lt 120573) Substituting (6) into inequality (4) and rearranging119875(Λ lt 120573) we have

119875 (Λ lt 120573) = 119875(P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 119903120572lt 120573)

= 119875(119903 gt (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

)

(7)

We then define a random variable 119877 as

119877 = (P

119905sdot 119862 sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

1120572

(8)

which is referred to the eavesdropping range of an eaves-dropper After substituting (8) into inequality (7) we have119875(Λ lt 120573) = 119875(119903 gt 119877) which implies that a transmissioncannot be eavesdropped by an eavesdropper if and only ifthe transmitter falls outside the eavesdropping range 119877 of theeavesdropper

We then analyze the effective eavesdropping area of aneavesdropper which is defined as 119864[120587119877

2] = 120587119864[1198772] where119864[1198772] is the second moment of the eavesdropping range 119877The effective eavesdropping area is a critical region that onlywhen the good node falls in this region its transmission canbe eavesdropped by eavesdroppers We then have

119864 [1205871198772] = 120587119864[(

119862 sdotP119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

] (9)

32 Probability of Eavesdropping Attacks We model thesuccessful chance of eavesdropping attacks by the probabilityof eavesdropping attacks denoted by 119875(119864) To derive 119875(119864) weneed to analyze the probability of no good node being eaves-dropped first We denote the number of good nodes falling inthe eavesdropping area by a random variable 119884 Since goodnodes are randomly distributed according to a homogeneousPoisson point process (as shown in Section 21) we then havethe probability of no good node falling in the eavesdroppingarea which is given by the following equation

119875 (119884 = 0) = 119890minus120588sdot119864[120587119877

2] (10)

We then can calculate 119875(119864) as follows

119875 (119864) = 1 minus 119875 (119884 = 0) = 1 minus 119890minus120588sdot119864[120587119877

2] (11)

After substituting 119864[1205871198772] in (11) by Right-Hand Side

(RHS) of (9) we have

119875 (119864) = 1

minus exp(minus120588 sdot 120587119864[(119862 sdotP

119905sdot 119866

119892sdot 119866

119890

120578 sdot 120573)

2120572

]) (12)

The physical meaning of 119875(119864) is the probability that aneavesdropper can successfully eavesdrop at least one trans-mission in WNoT Besides as shown in (12) the probabilityof eavesdropping attacks heavily depends on the path losseffect Note that thismodel can be extended to amore generalcase with consideration of the shadow fading effect and theRayleigh fading effect which will be analyzed in Section 4

33 Empirical Results We conduct extensive simulations toverify the effectiveness and the accuracy of our proposedmodel In our simulations the probability of eavesdroppingattacks in a WNoT is calculated by

1198751015840(119864) =

Ψ

Ω (13)

Mobile Information Systems 5

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 3 Probability of eavesdropping attacks 119875(119864) with path losseffect only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

where Ω and Ψ denote the number of total WNoT topolo-gies and the number of WNoT topologies that have beeneavesdropped respectively We say that a WNoT topology iseavesdropped when any smart object (node) in this topologyis eavesdropped Note that we denote the simulation resultsby 119875

1015840(119864) in order to differentiate it from the analyticalvalue 119875(119864) To minimize the impacts of the border effectswe conduct the simulations within an 119897 times 119897 area with theexclusion of the nodes falling in the outer box 1198971015840 times 1198971015840 where1198971015840 shall be significantly larger than 119897 [55] Note that 119897 ischosen as 3000m in our simulations We fix the numberof eavesdroppers and choose the node density 120588 for thegood nodes ranging from 10minus5 to 10minus1 The other systemparameters are selected as follows 119862 = 10 P

119905= 1mWatt

120578 = 001mWatt and 120573 = 10 dB We consider eavesdroppersequipped with either omnidirectional antenna (Omni) ordirectional antenna (Dir) while the good nodes are equippedwith omnidirectional antennas only

Figure 3 shows both the analytical results and the simu-lation results of the probability of eavesdropping attacks withthe path loss effect onlyThe curves and themarkers representthe analytical results and simulation results respectivelyIt is shown in Figure 3 that the simulation results have agood agreement with the analytical results implying that ourmodel is quite accurate

As shown in Figure 3 we also find that the probability ofeavesdropping attacks decreases with the increased path lossexponent 120572 implying that the path loss effect has the negativeimpact on eavesdropping attacks Besides we also find thatusing directional antennas at eavesdroppers can increase theprobability of eavesdropping attacks although this effect is notthat significant when the path loss effect is increased (eg 120572 =

35)

4 Impacts of Channel Randomness onEavesdropping Attacks

In this section we extend our analytical model in Section 3to more general cases in consideration of two different effectsof channel randomness (1) shadow fading effect and (2)

Rayleigh fading effect which will be presented in Sections41 and 42 respectively We then give the empirical resultsin Section 43

In order to model the two random effects we introducethe packet eavesdropping probability denoted by 119875

119864|Λ(119910)

which is defined as the probability that a packet is successfullyeavesdropped by an eavesdropper when the average signal-to-interference-noise ratio Λ = 119910

We then extend the analysis of eavesdropping range inSection 31 with consideration of the packet eavesdroppingprobability 119875

119864|Λ(119910) We first consider the case that the packet

eavesdropping probability 119875119864|Λ

(119910) tends to approach a stepfunction if good long code is used [56] In particular we havethe cumulative distribution function (CDF) of eavesdroppingrange 119877 which is defined as follows

119865119877 (119903) = 119875 [Λ (119903) lt 120573] = 119865

119877(

120578 sdot 120573

P119905sdot 119866

119892sdot 119866

119890

) (14)

In amore general casewhen119875119864|Λ

(119910) is not a step functionthe cumulative distribution function is

119865119877 (119903) = 1 minus int

+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)119875119864|Λ (119909) d119909 (15)

where 119891119877is the probability density function (PDF) of 119877

41 Shadow Fading Effect Following the similar approach[51] we can derive the probability density function of 119877 withconsideration of the shadow fading effect as follows

119891119877 (119909) =

1

radic2120587120590119909

sdot exp(minus1

2(ln119909 minus ln (119862 sdot 119903

minus120572)

120590)

2

)

(16)

where 119903 is the distance between a good node and aneavesdropper and 120590 is the standard deviation of the Gaussiandistribution describing the shadow fading effect

We then have the second moment of random variable 119877

given as follows

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903 (17)

After substituting [1 minus 119865119897(120578120573P

119905119860119866)] in (17) with RHS of

(15) and RHS of (16) (note that 119875119864|Λ

(119886) = 1) we finally have

119864 [1198772] = int

+infin

0

2119903int+infin

120578120573P119905119860119866

1

radic2120587120590119886

sdot 119890minus(12)((ln 119886minusln(119862sdot119903minus120572))120590)2d119886 d119903

(18)

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 5: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Mobile Information Systems 5

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 3 Probability of eavesdropping attacks 119875(119864) with path losseffect only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

where Ω and Ψ denote the number of total WNoT topolo-gies and the number of WNoT topologies that have beeneavesdropped respectively We say that a WNoT topology iseavesdropped when any smart object (node) in this topologyis eavesdropped Note that we denote the simulation resultsby 119875

1015840(119864) in order to differentiate it from the analyticalvalue 119875(119864) To minimize the impacts of the border effectswe conduct the simulations within an 119897 times 119897 area with theexclusion of the nodes falling in the outer box 1198971015840 times 1198971015840 where1198971015840 shall be significantly larger than 119897 [55] Note that 119897 ischosen as 3000m in our simulations We fix the numberof eavesdroppers and choose the node density 120588 for thegood nodes ranging from 10minus5 to 10minus1 The other systemparameters are selected as follows 119862 = 10 P

119905= 1mWatt

120578 = 001mWatt and 120573 = 10 dB We consider eavesdroppersequipped with either omnidirectional antenna (Omni) ordirectional antenna (Dir) while the good nodes are equippedwith omnidirectional antennas only

Figure 3 shows both the analytical results and the simu-lation results of the probability of eavesdropping attacks withthe path loss effect onlyThe curves and themarkers representthe analytical results and simulation results respectivelyIt is shown in Figure 3 that the simulation results have agood agreement with the analytical results implying that ourmodel is quite accurate

As shown in Figure 3 we also find that the probability ofeavesdropping attacks decreases with the increased path lossexponent 120572 implying that the path loss effect has the negativeimpact on eavesdropping attacks Besides we also find thatusing directional antennas at eavesdroppers can increase theprobability of eavesdropping attacks although this effect is notthat significant when the path loss effect is increased (eg 120572 =

35)

4 Impacts of Channel Randomness onEavesdropping Attacks

In this section we extend our analytical model in Section 3to more general cases in consideration of two different effectsof channel randomness (1) shadow fading effect and (2)

Rayleigh fading effect which will be presented in Sections41 and 42 respectively We then give the empirical resultsin Section 43

In order to model the two random effects we introducethe packet eavesdropping probability denoted by 119875

119864|Λ(119910)

which is defined as the probability that a packet is successfullyeavesdropped by an eavesdropper when the average signal-to-interference-noise ratio Λ = 119910

We then extend the analysis of eavesdropping range inSection 31 with consideration of the packet eavesdroppingprobability 119875

119864|Λ(119910) We first consider the case that the packet

eavesdropping probability 119875119864|Λ

(119910) tends to approach a stepfunction if good long code is used [56] In particular we havethe cumulative distribution function (CDF) of eavesdroppingrange 119877 which is defined as follows

119865119877 (119903) = 119875 [Λ (119903) lt 120573] = 119865

119877(

120578 sdot 120573

P119905sdot 119866

119892sdot 119866

119890

) (14)

In amore general casewhen119875119864|Λ

(119910) is not a step functionthe cumulative distribution function is

119865119877 (119903) = 1 minus int

+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)119875119864|Λ (119909) d119909 (15)

where 119891119877is the probability density function (PDF) of 119877

41 Shadow Fading Effect Following the similar approach[51] we can derive the probability density function of 119877 withconsideration of the shadow fading effect as follows

119891119877 (119909) =

1

radic2120587120590119909

sdot exp(minus1

2(ln119909 minus ln (119862 sdot 119903

minus120572)

120590)

2

)

(16)

where 119903 is the distance between a good node and aneavesdropper and 120590 is the standard deviation of the Gaussiandistribution describing the shadow fading effect

We then have the second moment of random variable 119877

given as follows

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903 (17)

After substituting [1 minus 119865119897(120578120573P

119905119860119866)] in (17) with RHS of

(15) and RHS of (16) (note that 119875119864|Λ

(119886) = 1) we finally have

119864 [1198772] = int

+infin

0

2119903int+infin

120578120573P119905119860119866

1

radic2120587120590119886

sdot 119890minus(12)((ln 119886minusln(119862sdot119903minus120572))120590)2d119886 d119903

(18)

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 6: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

6 Mobile Information Systems

where 119860119866

= 119864[(119866119892119866119890)2120572

] which is defined as the effectiveantenna gain factor It is obvious that the effective antennagain factor depends on both the antenna gains and the pathloss effect

Let 119909 = (ln 119886 minus ln119862119903minus120572)120590 = ln(119886119903120572119862)120590 we then have

119864 [1198772] = int

+infin

0

2119903int+infin

ln(120578120573119903minus120572P119905119860119866119862)120590

1

radic2120587119890minus11990922d119909 d119903 (19)

Since the integrals converge absolutely applying Fubinirsquostheorem [57] we next get

119864 [1198772] = (

P119905119860119866119862

120578120573)

2120572

exp((radic2120590

120572)

2

) (20)

Finally we have the probability of eavesdropping attackswhich is given as the following equation

119875 (119864) = 1

minus exp(minus120588120587(P

119905119860119866119862

120578120573)

2120572

exp(radic2120590

120572)

2

) (21)

The probability of eavesdropping attacks in (21) is moregeneral than that in (12) This is because (21) becomes (12)when 120590 becomes 0 implying that there is no shadow fadingeffect and SINR is completely determined by the path losseffect

42 Rayleigh Fading Effect Rayleigh fading effect is a stochas-tic model for wireless propagation when there are a largenumber of statistically independent reflected and scatteredpaths from the transmitters to the receivers (or the eavesdrop-pers)

In the following procedure we consider the channelcondition with superimposed shadow fading and Rayleighfading effects We then derive the secondmoment of randomvariable 119877 Since (17) still holds we have

119864 [1198772] = int

+infin

0

2119903 [1 minus 119865119897(

120578 sdot 120573

P119905sdot 119860

119866

)] d119903

= int+infin

0

2119903int+infin

0

119891119877(

120578 sdot 119909

P119905sdot 119866

119892sdot 119866

119890

| 119903)

sdot 119875119864|Λ (119909) d119909 d119903

(22)

where 119891119877((120578119909P

119905119866119892119866119890) | 119903) which can be calculated by (16)

We next derive 119875119864|Λ

(119909) Since the instantaneous SINR isexponentially distributed with mean Λ = 119910 [51] with thegiven average SINR value Λ and the given SINR threshold120573 the packet eavesdropping probability 119875

119864|Λ(119910) can be

calculated by

119875119864|Λ

(119910) = int+infin

120573

119891Λ(119910) d119909 = int

+infin

120573

1

119910sdot 119890

minus119909119910d119909

= 119890minus120573119910

(23)

After substituting the corresponding parts in (22) by (16)and (23) we finally have the effective eavesdropping range asfollows

119864 [1198772] = int

+infin

0

int+infin

0

119890minus(120578sdot120573)(119909sdotP

119905sdot119860119866)sdot 2119903

1

radic2120587120590119909

sdot 119890minus(12)((ln119909minusln(119862sdot119903minus120572))120590)2d119903 d119909

= int+infin

minusinfin

int+infin

0

1

radic2120587119890minus11990922

sdot 2119903

sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903 d119909

(24)

where119860119866= 119864[(119866

119892119866119890)2120572

] is the effective antenna gain factorThe integral in (24) can be calculated by the following

equation [58]

int+infin

0

2119903 sdot 119890minus(120578sdot120573sdot119903

120572sdot119890minus120590119909

)(119862sdotP119905sdot119860119866)d119903

=2

120572Γ (

2

120572) sdot (

120578 sdot 120573 sdot 119890minus120590119909

119862 sdotP119905sdot 119860

119866

)

minus2120572

(25)

where Γ(sdot) represents the general Gamma functionSubstituting (25) into (24) and applying it to (11) we

finally have

119875 (119864) = 1 minus 119890minus120588120587(2120572)Γ(2120572)sdot((120578sdot120573)(119862sdotP

119905sdot119860119866))minus2120572

sdot119890(radic2120590120572)

2

(26)

43 Empirical Results We have conducted extensive sim-ulations to evaluate the accuracy of our extended modelIn order to compare the new results with those under thecase without shadowing effects in Section 33 we choose thesame system parameters as those in Section 33 Note thatin order to eliminate the impacts of the border effect theborder area of the simulation area shall be slightly increasedSimilarly we also consider eavesdroppers equipped witheither omnidirectional antennas or directional antennas

Figure 4 shows the empirical results of the probabilityof eavesdropping attacks with shadow fading effects wherethe shadow fading deviation 120590 = 3 Note that the curvesand the markers represent the analytical results and simu-lation results respectively Figure 3 also indicates that thesimulation results match the analytical results implying theaccuracy of our model

As shown in Figure 4 we find that the probability ofeavesdropping attacks is affected by both the path loss effectand the shadow fading effect In particular 119875(119864) decreaseswith the increased path loss exponent 120572 implying that thepath loss effect is detrimental In other words the path losseffect will decrease the probability of eavesdropping attackswhich agrees with the previous results without the shadowingeffect (see Figure 3) On the contrary the shadow fading effectis beneficial More specifically if we compare Figure 4 withFigure 3 we can find that 119875(119864) increases with the increasedvalues of the shadow fading deviation 120590 (eg 120590 is increasedfrom0 to 3)This effect is remarkablewhen the path loss effectis less notable (eg 120572 = 25) However119875(119864) does not increase

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 7: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Mobile Information Systems 7

Table 2 Comparison between the results under the channel with shadow fading effect only and the results under the channel withsuperimposed shadowing and Rayleigh fading effects when 120572 = 3 120590 = 3 and SINR threshold 120573 = 10 dB

Node density Shadow fading effect only (Figure 4) Superimposed shadow fading andRayleigh fading effects (Figure 5)

120588 Omni Dir Omni Dir1 times 10

minus5 00050 00059 00045 (minus1000) 00053 (minus1017)1 times 10

minus4 00489 00572 00443 (minus941) 00518 (minus944)1 times 10minus3 03945 04453 03642 (minus768) 04126 (minus734)1 times 10minus2 09934 09972 09892 (minus420) 09951 (minus210)

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus5

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Dir_anaOmni_ana

Dir_simOmni_sim

Figure 4 Probability of eavesdropping attacks119875(119864)with shadowingeffect (120590 = 3) only when 120572 = 25 35 and SINR threshold 120573 = 10 dB

significantly with the increased values of 120590 when 120572 = 35Furthermore we also find that using directional antennas ateavesdroppers can increase the probability of eavesdroppingattacks with consideration of the shadowing effect

We then investigate the probability of eavesdroppingattacks under the channel with the superimposed shadowfading and Rayleigh fading effects Figure 5 shows the resultswith the presence of both shadow fading and Rayleigh fadingeffects where the shadow fading deviation 120590 = 3 As shownin Figure 5 we find that the probability of eavesdroppingattacks is affected by both the shadow fading effect and theRayleigh fading effect Moreover Figure 5 also indicates thatRayleigh fading effect has a negative impact on the probabilityof eavesdropping attacks even though it is not that noticeablecompared with the path loss effect

To illustrate the detrimental effect of Rayleigh fadingeffect we conduct comparative study on the numerical resultsof the probability of eavesdropping attacks119875(119864) In particularTable 2 illustrates the comparison between the results of 119875(119864)

under the channel with shadow fading effect only and theresults under the channel with the superimposed shadowfading effect and Rayleigh fading effect when 120572 = 3 and120590 = 3 corresponding to Figures 4 and 5 respectively

0

01

02

03

04

05

06

07

08

09

10

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

10minus4

10minus3

10minus2

10minus1

Node density

Dir_anaOmni_ana

Dir_simOmni_sim

120572 = 25 120572 = 35

Figure 5 Probability of eavesdropping attacks 119875(119864) with superim-posed shadowing effect and Rayleigh fading effect when 120590 = 3 andSINR threshold 120573 = 10 dB

To make it clearer we italicize the results with directionalantennas in Table 2 It is shown in Table 2 that Rayleighfading effect will decrease the probability of eavesdroppingattacks compared with the results under the channel withthe shadow fading effect only For example Rayleigh fadingeffect leads to the decrement of nearly 10 in terms of theprobability of eavesdropping attacks when the node density120588 = 10

minus5 Besides Table 2 also indicates that using directionalantennas at eavesdroppers can increase the probability ofeavesdropping attacks which is similar to the previousfindings

We also give the results under the scenario of eavesdrop-ping attacks with Rayleigh fading effect only Figure 6 showsthe empirical results of the probability of eavesdroppingattacks under the channel with Rayleigh fading effect onlywhere120590 = 0 indicating no shadow fading effect Similar to theprevious results we also denote the analytical results by thecurves and the simulation results by the markers as shownin Figure 6 It is shown in Figure 6 that the simulation resultshave a good agreement with the analytical results implyingthat our analytical model is quite accurate

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 8: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

8 Mobile Information Systems

0

01

02

03

04

05

06

07

08

09

10

Node density

Prob

abili

ty o

f eav

esdr

oppi

ng at

tack

s P(E)

Dir_anaOmni_ana

Dir_simOmni_sim

10minus5

10minus4

10minus3

10minus2

10minus1

120572 = 25 120572 = 35

Figure 6 Probability of eavesdropping attacks 119875(119864) with Rayleighfading effect only (without shadowing effect) where SINR threshold120573 = 10 dB and 120590 = 0

As shown in Figure 6 we can see that the probabilityof eavesdropping attacks also depends on both the pathloss effect and Rayleigh fading effect In particular 119875(119864)

drops significantly when the path loss effect becomes morenotable (eg 120572 = 35) as shown in Figure 6 Besides underthe wireless channel with Rayleigh fading effect 119875(119864) inFigure 6 is even lower than that without Rayleigh fadingeffect in Figure 3 implying that Rayleigh fading effect is alsodetrimental to the eavesdropping attacks The reason mayowe to the counteracting effect of the multipath scatteringsignals under the channel with Rayleigh fading effect [43]

44 Discussions and Implications of Our Results Our simu-lation results imply that using directional antennas at eaves-droppers in WNoT can significantly increase the probabilityof eavesdroppingThus directional antennas are beneficial toeavesdroppers The improvement mainly owes to the effectthat a directional antenna can accumulate the receivingcapability of desired directions However we can not ignoreanother effect that a directional antenna can also narrowthe angle of the receiving directions More specifically withthe increased path loss (ie the larger 120572) the second effectcan even counteract the first effect Take Figure 6 as anexample The gap between the results of omnidirectionaleavesdroppers and the results of directional eavesdropperswith 120572 = 25 is significantly bigger than that with 120572 = 35

Secondly as shown in our results both the path losseffect andRayleigh fading are always detrimental to the eaves-dropping probability while shadowing effect and directionalantennas are beneficial to the eavesdropping probabilityOur findings are useful to help to design more effectiveantieavesdropping schemes in WNoT This is because weneed the knowledge of eavesdroppers (such as the channel

characteristics) so thatwe can design the light-weight encryp-tion algorithms as indicated in the previous studies [37ndash42]Besides we only need to take antieavesdropping measures inthe area or the direction that is vulnerable to eavesdroppingattacks so that the security cost due to the computationalcomplexity can be greatly saved For example we can generatethe noise only in the direction of eavesdroppers when theeavesdroppers are equipped with directional antennas whilethere is no noise in other directions This new scheme mayhave a better performance than the existing one [35]

5 Conclusion

In this paper we propose an analytical model to investigatethe eavesdropping probability in Wireless Net of Things(WNoT) with consideration of channel randomness includ-ing the path loss effect the shadow fading effect and Rayleighfading effect After conducting extensive simulations weshow that our model is quite accurate Besides we have alsoshown that the eavesdropping probability heavily dependson the path loss effect the shadow fading effect andRayleigh fading effect More specifically we find that theeavesdropping probability increases when the shadow fadingfactor 120590 increases and decreases when the path loss effectincreases implying that the path loss effect is detrimentalto the eavesdropping attacks while the shadow fading isbeneficial to the eavesdropping attacks Moreover similarto the path loss effect Rayleigh fading is also destructiveto the eavesdropping attacks Furthermore our results alsoindicate that using directional antennas at eavesdropperscan significantly improve the probability of eavesdroppingattacks

Notation and Symbols

A 2D area that nodes are randomlydistributed

120588 Density of the homogeneous Poissonpoint process

P119905 Transmission power of nodes

119903 Distance between the good node and theeavesdropper

120574119894119895(119903) Channel gain from a good node 119894 to an

eavesdropper 119895 at a distance 119903

Λ SINR at an eavesdropper120573 Threshold value of SINR for

eavesdropping a node successfully120578 Power of the white noise119873 Number of good nodes120572 Path loss exponent119866119898 119866

119904 Antenna gain of main lobe antenna gainof side-lobe

120579119898 Main lobe beam-width of the keyhole

antenna119866119892 119866

119890 Antenna gain of good node antenna gainof eavesdropper

119875(119864) Probability of eavesdropping attacks119897 Side length of topology area119877 Eavesdropping range of an eavesdropper

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 9: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Mobile Information Systems 9

Ω Number of total WNoT topologiesΨ Number of WNoT topologies that have

been eavesdroppedΛ Average SINR value119875119864|Λ

(119910) Packet eavesdropping probability when theaverage SINR is 119910

120590 Standard deviation of the Gaussian distri-bution describing the shadow fading effect

119860119866 Effective antenna gain factor

Conflict of Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

The work described in this paper was partially supported byMacao Science and Technology Development Fund underGrant no 0962013A3 and Grant no 1042014A3 andsupported by Innovation Norway through the project ldquoGCEBLUE Maritime Big Datardquo The authors would like to thankGordon K-T Hon for his helpful comments that greatlyimprove the quality of this paper

References

[1] L Atzori A Iera and G Morabito ldquoThe internet of things asurveyrdquoComputer Networks vol 54 no 15 pp 2787ndash2805 2010

[2] D Miorandi S Sicari F De Pellegrini and I Chlamtac ldquoInter-net of things vision applications and research challengesrdquo AdHoc Networks vol 10 no 7 pp 1497ndash1516 2012

[3] ISOIEC 18000 2013 httpenwikipediaorgwikiISOIEC18000

[4] J Yick B Mukherjee and D Ghosal ldquoWireless sensor networksurveyrdquoComputerNetworks vol 52 no 12 pp 2292ndash2330 2008

[5] C Dixon R Mahajan S Agarwal et al ldquoAn operating systemfor the homerdquo in Proceedings of the 9th USENIX Conference onNetworked SystemsDesign and Implementation (NSDI rsquo12) p 25USENIX Association San Jose Calif USA April 2012

[6] K Habib A Torjusen and W Leister ldquoSecurity analysis ofa patient monitoring system for the Internet of Things ineHealthrdquo in Proceedings of the International Conference oneHealth Telemedicine and Social Medicine (eTELEMED rsquo15)Lisbon Portugal February 2015

[7] Z Fan P Kulkarni S Gormus et al ldquoSmart grid com-munications overview of research challenges solutions andstandardization activitiesrdquo IEEE Communications Surveys andTutorials vol 15 no 1 pp 21ndash38 2013

[8] H Wang O Osen G Li W Li H-N Dai and W Zeng ldquoBigdata and industrial internet of things for the maritime industryin Northwestern Norwayrdquo in Proceedings of the IEEE Region 10Conference (TENCON rsquo15) Macau China November 2015

[9] IEEE 802154 2011 httpstandardsieeeorggetieee802down-load802154-2011pdf

[10] Bluetooth Core Specification 42 2014 httpwwwbluetoothorg

[11] J Granjal E Monteiro and J Sa Silva ldquoSecurity for the internetof things a survey of existing protocols and open research

issuesrdquo IEEE Communications Surveys amp Tutorials vol 17 no3 pp 1294ndash1312 2015

[12] A GrauHow to Build a Safer Internet ofThings IEEE Spectrum2015

[13] S Sicari A Rizzardi L A Grieco and A Coen-PorisinildquoSecurity privacy and trust in Internet of Things the roadaheadrdquo Computer Networks vol 76 pp 146ndash164 2015

[14] G Strazdins and H Wang ldquoOpen security and privacy chal-lenges for the internet of thingsrdquo in Proceedings of the 10thInternational Conference on Information Communications andSignal Processing (ICICS rsquo15) 2015

[15] C Cai Y Cai X Zhou W Yang and W Yang ldquoWhen doesrelay transmission give a more secure connection in wireless adhoc networksrdquo IEEE Transactions on Information Forensics andSecurity vol 9 no 4 pp 624ndash632 2014

[16] N A Alrajeh S Khan and B Shams ldquoIntrusion detectionsystems in wireless sensor networks a reviewrdquo InternationalJournal of Distributed Sensor Networks vol 2013 Article ID167575 7 pages 2013

[17] N Meghanathan ldquoA survey on the communication protocolsand security in cognitive radio networksrdquo International Journalof CommunicationNetworks and Information Security vol 5 no1 pp 19ndash38 2013

[18] M Anand Z G Ives and I Lee ldquoQuantifying eavesdroppingvulnerability in sensor networksrdquo inProceedings of the 2nd Inter-national Workshop on Data Management for Sensor Networks(DMSN rsquo05) pp 3ndash9 August 2005

[19] J-C Kao and R Marculescu ldquoEavesdropping minimization viatransmission power control in ad-hoc wireless networksrdquo inProceedings of the 3rd Annual IEEE Communications Societyon Sensor and Ad Hoc Communications and Networks (SECONrsquo06) vol 2 pp 707ndash714 IEEE Reston Va USA September2006

[20] H-N Dai D Li and R C-W Wong ldquoExploring securityimprovement of wireless networks with directional antennasrdquoin Proceedings of the IEEE 36th Conference on Local ComputerNetworks (LCN rsquo11) pp 191ndash194 Bonn Germany October 2011

[21] X Lu F Wicker P Lio and D Towsley ldquoSecurity estimationmodel with directional antennasrdquo in Proceedings of the IEEEMilitary Communications Conference (MILCOM rsquo08) pp 1ndash6IEEE San Diego Calif USA November 2008

[22] Q Wang H-N Dai and Q Zhao ldquoEavesdropping securityin wireless Ad Hoc networks with directional antennasrdquo inProceedings of the 22nd Wireless and Optical CommunicationsConference (WOCC rsquo13) pp 687ndash692 May 2013

[23] H-N Dai Q Wang D Li and R C-W Wong ldquoOn eaves-dropping attacks in wireless sensor networks with directionalantennasrdquo International Journal of Distributed Sensor Networksvol 2013 Article ID 760834 13 pages 2013

[24] E Alsaadi and A Tubaishat ldquoInternet of things features chal-lenges and vulnerabilitiesrdquo International Journal of AdvancedComputer Science and Information Technology vol 4 no 1 pp1ndash13 2015

[25] F Anjum and P Mouchtaris Security for Wireless Ad HocNetworks Wiley-Interscience 1st edition 2007

[26] R Want ldquoAn introduction to RFID technologyrdquo IEEE PervasiveComputing vol 5 no 1 pp 25ndash33 2006

[27] IEEE 80211a-1999 httpstandardsieeeorggetieee802down-load80211a-1999pdf

[28] IEEE 80211i-2004 httpstandardsieeeorggetieee802down-load80211i-2004pdf

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 10: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

10 Mobile Information Systems

[29] D Wagner B Schneier and J Kelsey ldquoCryptanalysis ofthe cellular message encryption algorithmrdquo in Advances inCryptologymdashCRYPTO rsquo97 vol 1294 of Lecture Notes in Com-puter Science pp 526ndash537 Springer Berlin Germany 1997

[30] M Turkanovic B Brumen and M Holbl ldquoA novel userauthentication and key agreement scheme for heterogeneous adhoc wireless sensor networks based on the Internet of Thingsnotionrdquo Ad Hoc Networks vol 20 pp 96ndash112 2014

[31] A-R Sadeghi C Wachsmann and M Waidner ldquoSecurityand privacy challenges in industrial internet of thingsrdquo inProceedings of the 52nd Annual Design Automation Conference(DAC rsquo15) San Francisco Calif USA June 2015

[32] S L Keoh S S Kumar and H Tschofenig ldquoSecuring theinternet of things a standardization perspectiverdquo IEEE Internetof Things Journal vol 1 no 3 pp 265ndash275 2014

[33] Z Yan P Zhang and A V Vasilakos ldquoA survey on trustmanagement for internet of thingsrdquo Journal of Network andComputer Applications vol 42 pp 120ndash134 2014

[34] B Azimi-Sadjadi A Kiayias AMercado and B Yener ldquoRobustkey generation from signal envelopes in wireless networksrdquoin Proceedings of the 14th ACM Conference on Computer andCommunications Security (CCS rsquo07) pp 401ndash410 Denver ColoUSA November 2007

[35] O Savry F Pebay-Peyroula F Dehmas G Robert and JReverdy ldquoRFID noisy reader how to prevent from eavesdrop-ping on the communicationrdquo in Cryptographic Hardware andEmbedded SystemsmdashCHES 2007 vol 4727 of Lecture Notesin Computer Science pp 334ndash345 Springer Berlin Germany2007

[36] A Mukherjee S A A Fakoorian J Huang and A LSwindlehurst ldquoPrinciples of physical layer security in multiuserwireless networks a surveyrdquo IEEE Communications Surveys andTutorials vol 16 no 3 pp 1550ndash1573 2014

[37] G P Hancke ldquoPractical eavesdropping and skimming attackson high-frequency RFID tokensrdquo Journal of Computer Securityvol 19 no 2 pp 259ndash288 2011

[38] F Oggier and B Hassibi ldquoThe secrecy capacity of the MIMOwiretap channelrdquo IEEE Transactions on InformationTheory vol57 no 8 pp 4961ndash4972 2011

[39] R Liu T Liu H V Poor and S Shamai ldquoMultiple-inputmultiple-output gaussian broadcast channels with confidentialmessagesrdquo IEEETransactions on InformationTheory vol 56 no9 pp 4215ndash4227 2010

[40] X He A Khisti and A Yener ldquoMIMOmultiple access channelwith an arbitrarily varying eavesdropper secrecy degrees offreedomrdquo IEEE Transactions on InformationTheory vol 59 no8 pp 4733ndash4745 2013

[41] I Hero ldquoSecure space-time communicationrdquo IEEETransactionson Information Theory vol 49 no 12 pp 3235ndash3249 2003

[42] Y Zou B Champagne W-P Zhu and L Hanzo ldquoRelay-selection improves the security-reliability trade-off in cognitiveradio systemsrdquo IEEE Transactions on Communications vol 63no 1 pp 215ndash228 2015

[43] T S RappaportWireless Communications Principles and Prac-tice Prentice Hall Upper Saddle River NJ USA 2nd edition2002

[44] A Sawadi An RFID directional antenna for location positioning[PhD dissertation] University of Windsor 2012

[45] D M Dobkin The RF in RFID Passive UHF RFID in PracticeNewnes 2nd edition 2012

[46] X Li H-N Dai and Q Zhao ldquoAn analytical model oneavesdropping attacks in wireless networksrdquo in Proceedings ofthe IEEE International Conference on Communication Systems(ICCS rsquo14) pp 538ndash542 IEEE Macau China November 2014

[47] S Mathur W Trappe N Mandayam C Ye and A ReznikldquoRadio-telepathy extracting a secret key from an unauthenti-cated wireless channelrdquo in Proceedings of the ACM 14th AnnualInternational Conference on Mobile Computing and Networking(MobiCom rsquo08) pp 128ndash139 ACM San Francisco Calif USASeptember 2008

[48] F Huo and G Gong ldquoA new efficient physical layer OFDMencryption schemerdquo in Proceedings of the 33rd IEEE Conferenceon Computer Communications (INFOCOM rsquo14) pp 1024ndash1032Toronto Canada May 2014

[49] P Gupta and P R Kumar ldquoThe capacity of wireless networksrdquoIEEETransactions on InformationTheory vol 46 no 2 pp 388ndash404 2000

[50] M Franceschetti O Dousse D N Tse and P Thiran ldquoClosingthe gap in the capacity of wireless networks via percolationtheoryrdquo IEEE Transactions on Information Theory vol 53 no3 pp 1009ndash1018 2007

[51] D Miorandi E Altman and G Alfano ldquoThe impact of channelrandomness on coverage and connectivity of ad hoc and sensornetworksrdquo IEEE Transactions on Wireless Communications vol7 no 3 pp 1062ndash1072 2008

[52] C A Balanis AntennaTheory Analysis and Design JohnWileyamp Sons New York NY USA 2nd edition 1997

[53] R Ramanathan ldquoOn the performance of ad hoc networkswith beamforming antennasrdquo in Proceedings of the 2nd ACMInternational Symposium on Mobile Ad Hoc Networking ampComputing (MobiHoc rsquo01) pp 95ndash105 ACM Long Beach CalifUSA October 2001

[54] Q Wang H-N Dai and Q Zhao ldquoConnectivity of wirelessAd Hoc networks impacts of antenna modelsrdquo in Proceedingsof the 14th International Conference on Parallel and DistributedComputing Applications and Technologies (PDCAT rsquo13) pp298ndash303 Taipei Taiwan December 2013

[55] C Bettstetter ldquoOn the connectivity of ad hoc networksrdquo TheComputer Journal vol 47 no 4 pp 432ndash447 2004

[56] M Zorzi and S Pupolin ldquoOutage probability in multipleaccess packet radio networks in the presence of fadingrdquo IEEETransactions on Vehicular Technology vol 43 no 3 pp 604ndash610 2002

[57] J Borwein D Bailey and R Girgensohn Experimentationin Mathematics Computational Paths to Discovery Wellesley2004

[58] I S Gradshteyn and I M Ryzhik Table of Integrals Series andProducts Academic Press New York NY USA 7th edition2007

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Page 11: Research Article An Analytical Study on Eavesdropping ...downloads.hindawi.com/journals/misy/2016/4313475.pdf · Research Article An Analytical Study on Eavesdropping Attacks in Wireless

Submit your manuscripts athttpwwwhindawicom

Computer Games Technology

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Distributed Sensor Networks

International Journal of

Advances in

FuzzySystems

Hindawi Publishing Corporationhttpwwwhindawicom

Volume 2014

International Journal of

ReconfigurableComputing

Hindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Applied Computational Intelligence and Soft Computing

thinspAdvancesthinspinthinsp

Artificial Intelligence

HindawithinspPublishingthinspCorporationhttpwwwhindawicom Volumethinsp2014

Advances inSoftware EngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Journal of

Computer Networks and Communications

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation

httpwwwhindawicom Volume 2014

Advances in

Multimedia

International Journal of

Biomedical Imaging

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

ArtificialNeural Systems

Advances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Computational Intelligence and Neuroscience

Industrial EngineeringJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Human-ComputerInteraction

Advances in

Computer EngineeringAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014