A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems

Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming th...

Full description

Bibliographic Details
Main Authors: Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8760227/
_version_ 1831684552240660480
author Abiodun Esther Omolara
Aman Jantan
Oludare Isaac Abiodun
Kemi Victoria Dada
Humaira Arshad
Etuh Emmanuel
author_facet Abiodun Esther Omolara
Aman Jantan
Oludare Isaac Abiodun
Kemi Victoria Dada
Humaira Arshad
Etuh Emmanuel
author_sort Abiodun Esther Omolara
collection DOAJ
description Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, and videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception, and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis, and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages.
first_indexed 2024-12-20T08:03:13Z
format Article
id doaj.art-61b65d73f6264523b56f9daef1f3e0c0
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T08:03:13Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-61b65d73f6264523b56f9daef1f3e0c02022-12-21T19:47:28ZengIEEEIEEE Access2169-35362019-01-01710088110089810.1109/ACCESS.2019.29283598760227A Deception Model Robust to Eavesdropping Over Communication for Social Network SystemsAbiodun Esther Omolara0https://orcid.org/0000-0002-7801-2541Aman Jantan1Oludare Isaac Abiodun2https://orcid.org/0000-0003-0138-6446Kemi Victoria Dada3Humaira Arshad4Etuh Emmanuel5Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaDepartment of Statistics, Ahmadu Bello University, Zaria, NigeriaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaDepartment of Mathematics, Arthur Jarvis University, Calabar, NigeriaCommunication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, and videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception, and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis, and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages.https://ieeexplore.ieee.org/document/8760227/Attackerbrute-forcechatdecoydeceptioneavesdropper
spellingShingle Abiodun Esther Omolara
Aman Jantan
Oludare Isaac Abiodun
Kemi Victoria Dada
Humaira Arshad
Etuh Emmanuel
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
IEEE Access
Attacker
brute-force
chat
decoy
deception
eavesdropper
title A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
title_full A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
title_fullStr A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
title_full_unstemmed A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
title_short A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
title_sort deception model robust to eavesdropping over communication for social network systems
topic Attacker
brute-force
chat
decoy
deception
eavesdropper
url https://ieeexplore.ieee.org/document/8760227/
work_keys_str_mv AT abiodunestheromolara adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT amanjantan adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT oludareisaacabiodun adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT kemivictoriadada adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT humairaarshad adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT etuhemmanuel adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT abiodunestheromolara deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT amanjantan deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT oludareisaacabiodun deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT kemivictoriadada deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT humairaarshad deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems
AT etuhemmanuel deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems