论文标题
基于人造灰尘的攻击建模:对下一代WCN安全性的威胁
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
论文作者
论文摘要
本文介绍了一种系统的新型机制,用于在WCN(无线通信网络)中设计安全攻击。提出的模型涉及入侵者对AD(人造灰尘)的实施,然后执行HD(半双链)攻击。通信网络基于使用未知CSI(渠道状态信息)的城市和农村场景的部署。取决于基于用户与BS的距离所达到的路径损失,对攻击的用户最高。 AD的配方泄露了专门针对选定合法用户的安全网络的敏感性。可见性参数定义了通信通道中存在的AD量。基于人造灰尘所产生的枚举衰减,评估保密率的参数,用户与BS和工作频率的距离不同。此外,Intruder在指定的有效用户上启动了HD攻击的建议方案。攻击的策略集中在上行链路的连续监视器上,并尝试对下行链路进行欺凌攻击,其中资源的分配发生。通过检查模拟结果来证实所提出的方法的功效。与FD的常规方法相比,对拟议机制的评估突出了显着的特征。
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack.