A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming th...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8760227/ |
_version_ | 1831684552240660480 |
---|---|
author | Abiodun Esther Omolara Aman Jantan Oludare Isaac Abiodun Kemi Victoria Dada Humaira Arshad Etuh Emmanuel |
author_facet | Abiodun Esther Omolara Aman Jantan Oludare Isaac Abiodun Kemi Victoria Dada Humaira Arshad Etuh Emmanuel |
author_sort | Abiodun Esther Omolara |
collection | DOAJ |
description | Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, and videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception, and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis, and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages. |
first_indexed | 2024-12-20T08:03:13Z |
format | Article |
id | doaj.art-61b65d73f6264523b56f9daef1f3e0c0 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T08:03:13Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-61b65d73f6264523b56f9daef1f3e0c02022-12-21T19:47:28ZengIEEEIEEE Access2169-35362019-01-01710088110089810.1109/ACCESS.2019.29283598760227A Deception Model Robust to Eavesdropping Over Communication for Social Network SystemsAbiodun Esther Omolara0https://orcid.org/0000-0002-7801-2541Aman Jantan1Oludare Isaac Abiodun2https://orcid.org/0000-0003-0138-6446Kemi Victoria Dada3Humaira Arshad4Etuh Emmanuel5Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaDepartment of Statistics, Ahmadu Bello University, Zaria, NigeriaSecurity and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, MalaysiaDepartment of Mathematics, Arthur Jarvis University, Calabar, NigeriaCommunication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, and videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception, and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis, and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages.https://ieeexplore.ieee.org/document/8760227/Attackerbrute-forcechatdecoydeceptioneavesdropper |
spellingShingle | Abiodun Esther Omolara Aman Jantan Oludare Isaac Abiodun Kemi Victoria Dada Humaira Arshad Etuh Emmanuel A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems IEEE Access Attacker brute-force chat decoy deception eavesdropper |
title | A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems |
title_full | A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems |
title_fullStr | A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems |
title_full_unstemmed | A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems |
title_short | A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems |
title_sort | deception model robust to eavesdropping over communication for social network systems |
topic | Attacker brute-force chat decoy deception eavesdropper |
url | https://ieeexplore.ieee.org/document/8760227/ |
work_keys_str_mv | AT abiodunestheromolara adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT amanjantan adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT oludareisaacabiodun adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT kemivictoriadada adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT humairaarshad adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT etuhemmanuel adeceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT abiodunestheromolara deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT amanjantan deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT oludareisaacabiodun deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT kemivictoriadada deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT humairaarshad deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems AT etuhemmanuel deceptionmodelrobusttoeavesdroppingovercommunicationforsocialnetworksystems |