On modeling eavesdropping attacks in wireless networks

X Li, J Xu, HN Dai, Q Zhao, CF Cheang… - Journal of Computational …, 2015 - Elsevier
This paper concerns the eavesdropping attacks from the eavesdroppers' perspective, which
is new since most of current studies consider the problem from the good nodes' perspective …

An analytical model on eavesdropping attacks in wireless networks

X Li, HN Dai, Q Zhao - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
This paper concerns the eavesdropping problem from the eavesdroppers' perspective,
which is new since most of previous studies only concentrate on the good nodes. We …

Eavesdropping activities in wireless networks: Impact of channel randomness

X Li, HN Dai, Y Wang, H Wang - TENCON 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
This paper presents a novel analytical model to investigate the eavesdropping attacks in
wireless networks in the presence of channel randomness with emphasis on the shadow …

On eavesdropping attacks in wireless networks

HN Dai, H Wang, H Xiao, X Li… - 2016 IEEE Intl …, 2016 - ieeexplore.ieee.org
Eavesdropping attacks have become one of major threats in wireless networks since it is the
prerequisite of other malicious attacks. Most of current studies concentrate on designing anti …

Defending against eavesdropping attack leveraging multiple antennas in wireless networks

Y Zou, J Zhu, B Zheng - 2013 8th International Conference on …, 2013 - ieeexplore.ieee.org
Wireless communication is vulnerable to eavesdropping attack due to the broadcast nature
of radio propagation. In recent years, physical-layer security is emerging as a promising …

Eavesdropping security in wireless ad hoc networks with directional antennas

Q Wang, HN Dai, Q Zhao - 2013 22nd Wireless and Optical …, 2013 - ieeexplore.ieee.org
The eavesdropping security of wireless ad hoc networks has attracted considerable
attention recently. However, most of current studies only consider OMN networks, where …

On eavesdropping attacks in wireless sensor networks with directional antennas

HN Dai, Q Wang, D Li… - International Journal of …, 2013 - journals.sagepub.com
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN)
since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs …

An analytical study on eavesdropping attacks in wireless nets of things

X Li, H Wang, HN Dai, Y Wang… - Mobile Information …, 2016 - Wiley Online Library
The security of Internet of Things (IoT) has received extensive attention recently. This paper
presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net …

Optimum routing protection against cumulative eavesdropping in multihop wireless networks

S Bashar, Z Ding - MILCOM 2009-2009 IEEE Military …, 2009 - ieeexplore.ieee.org
We investigate the risk associated with multihop wireless communications due to
eavesdropping. When the same message traverses cross a multihop wireless network …

[HTML][HTML] Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference

Q Wang - Computers & Security, 2021 - Elsevier
The broadcast nature of wireless communication makes it intrinsically vulnerable to
eavesdropping attacks. This article suggests the using of secret spreading codes (ie only a …