An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things

The security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers various channel conditions, including the path loss, the shadow fading effec...

Full description

Bibliographic Details
Main Authors: Xuran Li, Hao Wang, Hong-Ning Dai, Yuanyuan Wang, Qinglin Zhao
Format: Article
Language:English
Published: Hindawi Limited 2016-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2016/4313475
id doaj-e6cf9d93f0ca4bd5b3762c2f769308bd
record_format Article
spelling doaj-e6cf9d93f0ca4bd5b3762c2f769308bd2021-07-02T06:26:50ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2016-01-01201610.1155/2016/43134754313475An Analytical Study on Eavesdropping Attacks in Wireless Nets of ThingsXuran Li0Hao Wang1Hong-Ning Dai2Yuanyuan Wang3Qinglin Zhao4Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Room A208, Taipa, MacauBig Data Lab, Faculty of Engineering and Natural Sciences, Norwegian University of Science & Technology, Postboks 1517, 6025 Ålesund, NorwayFaculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Room A208, Taipa, MacauFaculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Room A208, Taipa, MacauFaculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Room A208, Taipa, MacauThe security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers various channel conditions, including the path loss, the shadow fading effect, and Rayleigh fading effect. Besides, we also consider the eavesdroppers in WNoT equipped with either omnidirectional antennas or directional antennas. Extensive simulation results show that our model is accurate and effective to model the eavesdropping attacks in WNoT. Besides, our results also indicate that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect, Rayleigh fading effect, and the antenna models. In particular, we find that the shadow fading effect is beneficial to the eavesdropping attacks while both the path loss effect and Rayleigh fading effect are detrimental. Besides, using directional antennas at eavesdroppers can also increase the eavesdropping probability. Our results offer some useful implications on designing antieavesdropping schemes in WNoT.http://dx.doi.org/10.1155/2016/4313475
collection DOAJ
language English
format Article
sources DOAJ
author Xuran Li
Hao Wang
Hong-Ning Dai
Yuanyuan Wang
Qinglin Zhao
spellingShingle Xuran Li
Hao Wang
Hong-Ning Dai
Yuanyuan Wang
Qinglin Zhao
An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
Mobile Information Systems
author_facet Xuran Li
Hao Wang
Hong-Ning Dai
Yuanyuan Wang
Qinglin Zhao
author_sort Xuran Li
title An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
title_short An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
title_full An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
title_fullStr An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
title_full_unstemmed An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
title_sort analytical study on eavesdropping attacks in wireless nets of things
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2016-01-01
description The security of Internet of Things (IoT) has received extensive attention recently. This paper presents a novel analytical model to investigate the eavesdropping attacks in Wireless Net of Things (WNoT). Our model considers various channel conditions, including the path loss, the shadow fading effect, and Rayleigh fading effect. Besides, we also consider the eavesdroppers in WNoT equipped with either omnidirectional antennas or directional antennas. Extensive simulation results show that our model is accurate and effective to model the eavesdropping attacks in WNoT. Besides, our results also indicate that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect, Rayleigh fading effect, and the antenna models. In particular, we find that the shadow fading effect is beneficial to the eavesdropping attacks while both the path loss effect and Rayleigh fading effect are detrimental. Besides, using directional antennas at eavesdroppers can also increase the eavesdropping probability. Our results offer some useful implications on designing antieavesdropping schemes in WNoT.
url http://dx.doi.org/10.1155/2016/4313475
work_keys_str_mv AT xuranli ananalyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT haowang ananalyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT hongningdai ananalyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT yuanyuanwang ananalyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT qinglinzhao ananalyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT xuranli analyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT haowang analyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT hongningdai analyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT yuanyuanwang analyticalstudyoneavesdroppingattacksinwirelessnetsofthings
AT qinglinzhao analyticalstudyoneavesdroppingattacksinwirelessnetsofthings
_version_ 1721337310625136640