Skip to main content
Log in

Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper explores the benefits of using directional antennas in an eavesdropping attack in millimeter-wave (mmWave)-based wireless personal area networks (WPANs) and the security enhancement of mmWaves. The detection and protection probabilities are analyzed for the eavesdropper’s and transmitter’s perspectives, respectively. The analysis is based on the probability density function of distance between devices (DEVs), the exposure region, and the interference free (limited) exposure region of a DEV. Four cases, in which all target DEVs and an eavesdropper are equipped with either a directional antenna or an omni-directional antenna, are considered in a single-hop and a multi-hop communications. The expected lower bound of an eavesdropper’s detection probability and the relative detection rate are presented. Numerical results show that there exists a number of DEVs such that an eavesdropper can detect DEVs maximally. The detection probability tends to zero in a single-hop case, while it is saturated in a multi-hop case, as the number of DEVs increases. A DEV can communicate safely in one hop, while the communication is not secure anymore after several hops. Based on these results, we can conclude that the use of a directional antenna enables the better protection from an eavesdropping attack in mmWave-band communication and mmWave band can improve the security in communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Giannetti, R., Luise, M., & Reggiannini, R. (1999). Mobile and personal communications in the 60 GHz band: A survey. Wireless Personal Commununications, 10(2), 207–243.

    Article  Google Scholar 

  2. Rendevski, N., & Cassioli, D. (2013). UWB and mmWave communication techniques and systems for healthcare. In M. R. Yuce (Ed.), Ultra-wideband and 60 GHz communications for biomedical applications (pp. 1–22). New York, NY: Springer.

    Google Scholar 

  3. IEEE 802.15 WPAN Millimeter Wave Alternative PHY Task Group 3c (TG3c). (2015). http://www.ieee802.org/15/pub/TG3c_contributions.html, November 2015.

  4. Rout, D. K., & Das, S. (2014). Interference mitigation in wireless body area networks using modified and modulated MHP. Wireless Personal Communications, 77(2), 1343–1361.

    Article  Google Scholar 

  5. IEEE P802.15.3c/D08. (2009). IEEE 802 Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs). Amendment 2: Millimeter-wave based alternative physical layer extension, June 2009.

  6. IEEE P802.11ad/D1.0. (2010). Part 11: Wireless LAN medium access control 5 (MAC) and physical layer (PHY) specifications amendment 5: 6 enhancements for very high throughput in the 60GHz band, September 2010.

  7. Standard ECMA-387. (2008). High rate 60GHz PHY, MAC and HDMI PAL, December 2008.

  8. Sun, Z., & Lu, J. (2003). Improving the security performance in mobile wireless computing network using smart directional antenna. In Proceedings of CEEM (pp. 47–50).

  9. Kannan, P. M., Swaminathan, R., & Palanisamy, V. (2009). Enhancing WLAN security with sectored antennas. In Proceedings of ICUMT (pp. 1–5).

  10. Lu, X., Towsley, D., Lio, P., Wicker, F., & Xiong, Z. (2009). Minimizing detection probability routing in ad hoc networks using directional antennas. EURASIP Journal of Wireless Communications and Networking. doi:10.1155/2009/256714.

    Google Scholar 

  11. Dai, H.-N., Li, D., & Wong, R. C.-W. (2011). Exploring security improvement of wireless networks with directional antennas. In Proceedings of LCN (pp. 191–194).

  12. Dai, H.-N., Wang Q., Li, D., & Wong, R. C.-W. (2013). On eavesdropping attacks in wireless sensor networks with directional antennas. International Journal of Distributed Sensor Networks, article ID 760834.

  13. Pongaliur, K., & Xiao, L. (2011). Maintaining source privacy under eavesdropping and node compromise attacks. In Proceedings of INFOCOM (pp. 1656–1664).

  14. Goel, S., Aggarwal, V., Yener, A., & Calderbank, A. R. (2010). Modeling location uncertainty for eavesdroppers: A secrecy graph approach. In Proceedings of ISIT (pp. 2627–2631).

  15. Zhou, X., Ganti, R. K., & Andrews, J. G. (2011). Secure wireless network connectivity with multi-antenna transmission. IEEE Transactions on Wireless Communications, 10(2), 425–430.

    Article  Google Scholar 

  16. Boonyakarn, P., Komolkiti, P., & Aswakul, C. (2011). Game-based analysis of eavesdropping defense strategy in WMN with directional antenna. In Proceedings of JCSSE (pp. 29–33).

  17. Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang C. F., & Wang, Q. (2014). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science.

  18. Garnaev, A., & Trappe, W. (2014). Secret communication when the eavesdropper might be an active adversary. In Proceedings of MACOM, vol. 8715 of Lecture Notes of Computer Science (pp. 121–136).

  19. Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., George, K., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.

    Article  Google Scholar 

  20. Valliappan, N. (2012). Antenna subset modulation for secure millimeter-wave wireless communication. M.S. thesis, Chap 4, Science in Engineering, University of Texas, Austin, TX, USA.

  21. Garnaev, A., Baykal-Gursoy, M., & Poor, H. V. (2014). Incorporating attack type uncertainty into network protection. IEEE Transactions on Information Forensics and Security, 9, 1278–1287.

    Article  Google Scholar 

  22. Mukherjee A., & Swindlehurst, A. L. (2010). Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In Proceedings of MILCOM (pp. 1695–1700).

  23. Mukherjee, A., & Swindlehurst, A. L. (2013). Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Process, 61(1), 82–91.

    Article  MathSciNet  Google Scholar 

  24. Cai, L. X., Cai, L., Shen, X., & Mark, J. W. (2010). REX: A randomized exclusive region based scheduling scheme for mmWave WPANs with directional antenna. IEEE Transactions on Wireless Communications, 9(1), 113–121.

    Article  Google Scholar 

  25. Kim, M., Kim, Y., & Lee, Y. (2014). Resource allocation scheme for millimeter wave-based WPANs using directional antennas. ETRI Journal, 36(3), 385–395.

    Article  Google Scholar 

  26. Kim, M., Hong, S.-E., & Kim, J. (2012). Analysis of directional communication via relaying devices in mmWave WPANs. IEEE Communication Letters, 16(5), 342–345.

    Google Scholar 

  27. Kim, M., Hong, S.-E., Kim, Y., & Kim, J. (2013). Analysis of resource assignment for directional multi-hop communications in mm-Wave WPANs. ETRI Journal, 35(1), 120–130.

    Article  Google Scholar 

  28. Kim, M., Kim, Y. S., & Lee, W. (2012). Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments. ETRI Journal, 34(1), 24–34.

    Article  Google Scholar 

  29. Kim, M., & Lee, Y. (2013). Optimal contention window size for IEEE 802.15.3c mmWave WPANs. Wireless Networks, 20(6), 1335–1347.

    Article  Google Scholar 

  30. Kim, M. (2015). Multi-hop communications in directional CSMA/CA over mmWave WPANs. Wireless Communications and Mobile Computing. doi:10.1002/wcm.2566.

  31. Kim, M., Kim, Y. S., & Lee, Y. (2013). Analysis of directional neighbour discovery process in millimetre wave wireless personal area networks. IET Networks, 2(2), 92–102.

    Article  MathSciNet  Google Scholar 

  32. Khan, S., & Pathan, A.-S. K. (2013). Wireless networks and security issues, challenges and research trends. Heidelberg: Springer.

    Book  Google Scholar 

  33. Yi, S., Pei, Y., & Kalyanaraman, S. (2003). On the capacity improvement of ad hoc wireless networks using directional antennas. In Proceedings of MobiHoc (pp. 108–116).

  34. Math world. (2005). Square line picking. http://mathworld.wolfram.com/SquareLinePicking.html, January 2005.

Download references

Acknowledgments

The authors would like to thank the associate editor and the anonymous reviewers for their constructive and valuable comments. This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MEST, MSIP) (NRF-2010-0022282, NRF-2013R1A2A2A01067452).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meejoung Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, M., Hwang, E. & Kim, JN. Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas. Wireless Netw 23, 355–369 (2017). https://doi.org/10.1007/s11276-015-1160-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1160-4

Keywords

Navigation