2019
DOI: 10.1109/access.2019.2919674
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Eavesdropping Attack in 802.11ad mmWave Wireless Networks

Abstract: Next generation wireless communication networks utilizing 60 GHz millimeter wave (mmWave) frequency bands are expected to achieve multi-gigabit throughput with the use of highly directional phased-array antennas. These directional signal beams provide enhanced security to the legitimate networks due to the increased difficulties of eavesdropping. However, there still exists significant possibility of eavesdropping since 1) the reflections of the signal beam from ambient reflectors enables opportunistic station… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…In [80], Balakrishnan et al introduce two new types of eavesdropping attacks based on a next-generation wireless communication network, i.e., opportunistic stationary attacks and active nomadic attacks, and study the success probability of these two attacks.…”
Section: Jamming Noisementioning
confidence: 99%
“…In [80], Balakrishnan et al introduce two new types of eavesdropping attacks based on a next-generation wireless communication network, i.e., opportunistic stationary attacks and active nomadic attacks, and study the success probability of these two attacks.…”
Section: Jamming Noisementioning
confidence: 99%
“…where Rx i and , Rx noise i are the photocurrent and noise current of the PD generated by the optical signal in the Rx, respectively. They are given by Equations ( 2) and (3) [27]:…”
Section: Security Model Of Opa-based Owc Systemmentioning
confidence: 99%
“…The SLL is defined as the power ratio between the main beam and peak sidelobe. A low SLL reduces information leakage and improves the beam power efficiency in the desired direction [26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…Ad hoc domain attacks consist of denial of service attacks [112], impersonation attacks [113], replay attacks [114], routing attacks [115], eavesdropping attacks [116], etc. In DoS attacks, the adversary blocks the whole communication channel with interference signals.…”
Section: Cyber-security Issuesmentioning
confidence: 99%