The use of non-steady state noise interferences to counteract passive eavesdropping devices
DOI:
https://doi.org/10.30837/rt.2021.4.207.14Keywords:
passive radio eavesdropping devices, radio-frequency suppression, non-steady state noise, information protectionAbstract
The use of noise interference has become a common practice for information security. Recently appeared publications showing a potential possibility to use the noise radio frequency interference for information skimming by passive radio eavesdropping device. In particular, the vulnerability of the premises protected from eavesdropping devices is increased, if the radio frequency noising is switched on when confidential negotiations are being conducted. The use of radio noise waves energy for eavesdropping makes such devices invisible to nonlinear locators for listening devices if they activated only by noise signals. The paper shows that the use of non-steady state noise allows counteracting the unauthorized pickup of information. The analysis of non-steady state radio frequency noise effectiveness was carried out using the correlation receiver model. The correlation receiver has the highest sensitivity, and it works more efficiently with noise-like signals. It is shown that for counteracting the information pickup, it is necessary to use a noise, amplitude modulated by a random signal, whose spectrum coincides with a spectrum of a potential informational signal. Imposition a more powerful modulation noise to a weak informational signal makes impossible the information transfer. It is shown on the example of changing the power of a monochromatic signal while “beetle” transmits using steady-state and non-steady state noises, that due to the signal energy parametric redistribution over the non-steady-state noise modulation spectrum, the power of monochromatic signal is reduced by more than 10 dB compared to the transmission of the same signal using a steady-state noise. It can be concluded that the use of non-steady state noise signals for radio frequency suppression makes impossible their use for passive eavesdropping devices operation.
References
Encyclopedia of industrial espionage / Under total. ed. E. V. Kurenkova. St. Petersburg: ed. LLC "Publishing house Polygon", 1999. 515p.
Youhong Feng, Shihao Yan, Jinhong Yuan. User and Relay Selection With Artificial Noise to Enhance Physical Layer Security // Published 19 September 2018 Computer Science IEEE Transactions on Vehicular Technology. р. 10906-10920.
Xing H., Wong K., Chu, Z., Nallanathan A. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying // IEEE Trans. Signal Process. 2015, 63, р. 6616–6631.
S. S. Kalamkar and A. Banerjee. Secure Communication via a Wireless Energy Harvesting Untrusted Relay // IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2199-2213, March 2017.
Kyriakos Fytrakis, N. Kolokotronis, Konstantinos Katsanos, N. Kalouptsidis. Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints Computer Science // IEEE Access 2020 DOI: 10.1109 / ACCESS.2020.3005481 Corpus ID: 220466452
Youhong Feng, Z. Yang, Shihao Yan, Nan Yang, Bin Lv It is shown that the JUFDRS scheme significantly outperforms the joint user and half-duplex relay selection (JUHDRS) scheme when the self-interference at the FD relay can be reasonably suppressed Computer Science // 2017 IEEE International Conference on Communications (ICC) 2017 TLDR DOI:10.1109/TVT.2018.2870280
C. Gong, X. Yue, Z. Zhang, X. Wang and X. Dai. Enhancing Physical Layer Security With Artificial Noise in Large-Scale NOMA Networks // IEEE Transactions on Vehicular Technology, vol. 70, no. 3, pp. 2349-2361, March 2021, doi: 10.1109/TVT.2021.3057661.
Serhiienko Sergey, Krizhanovski Vladimir, Chernov Dmitry. Transmission of Information by a Passive Radio Device in the Field of Radio Noise Interference with Transmission on Terrestrial Radio Frequency // Multidisciplinary Research. Abstracts of XIV International Scientific and Practical Conference Bilbao, Spain. December 21–24, 2020. P. 470–474. DOI – 10.46299/ISG.2020.II.XIV
Serhiienko S., Krizhanovski V. Modeling of the potential threat of unauth. orized removal of information by a passive radio tab in the rooms protected by noise field // The Fourth International Conference on Information and Telecommunication Technologies and Radio Electronic (UkrMiCo’2019) 09–13 September 2019 Odessa, Ukraine.
Serhiienko S.P., Kryzhanovsky V.G., Chernov D.V., Zagoruyko L.V. Effective modes of operation of radio-charging devices for secret recording of information in the field of noise interference // Radio Engineering. 2021. Vip. 205. S. 169-174. DOI:10.30837/rt.2021.2.205.18
A. S. Luchinin, I. V. Malygin, A. G. Dolmatov and A. A. Yazovsky. Synchronization and Noise Immunity of Communication Systems Using Signals with Multi-position Modulation // 2018Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), 2018, pp. 1-5, doi: 10.1109/SYNCHROINFO.2018.8456963.
Kyriakos Fytrakis, N. Kolokotronis, Konstantinos Katsanos, N. Kalouptsidis. Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints Computer Science IEEE Access 2020 DOI: 10.1109 / ACCESS.2020.3005481 Corpus ID: 220466452
G. V. Kulikov, A. A. Lelyukh, E. V. Batalov, P. I. Kuzelenkov. Immunity of reception QAM signals in the presence of phase-shift keying interference // Radio electronics journal [electronic journal]. 2019. №7. Access mode: http://jre.cplire.ru/jre/jul19/10/text.pdf DOI 10.30898 / 1684-1719.2019.7.10
Alshammari A.S., Sobhy M.I., Lee P. (2018) Digital Communication System with High Security and High Noise Immunity: Security Analysis and Simulation. In: Barolli L., Xhafa F., Conesa J. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engi-neering and Communications Technologies, vol 12. Springer, Cham. doi.org/10.1007/978-3-319-69811-3_43
Varakin L.E. Communication systems with noise-like signals, Moscow, P.384. https://www.studmed.ru/varakin-le-sistemy-svyazi-sshumopodobnymisignalami_7cfcca93721.html(accessed 14 May, 2019).
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).