E-COMMERCE PHYSICAL LAYER SECURITY: PERFORMANCE ANALYSIS OF EAVESDROPPER ATTACK IN WIRELESS NETWORKS

Authors

  • Zorica Nikolić MB University, Faculty of Business and Law
  • Marko Smilić University of Priština in Kosovska Mitrovica, Faculty of Sciences and Mathematics, Kosovska Mitrovica, Serbia

DOI:

https://doi.org/10.61837/mbuir010123074n

Keywords:

e-commerce, physical layer security, intercept probability, secrecy capacity

Abstract

The evolution of technology and the internet led to the opening of infinite ways to engage with consumers worldwide. The idea of everything taking place online is now applicable for the finance and banking sector as well. The system of online wallets and e-transactions have become very common as a mode of payment. But handling money on a network is also dangerous as hackers may break into the firewall. The security wireless communication in e-commerce has received extensive attention recently. This paper offers an analytical framework to investigate the eavesdropping attacks over wireless communication link. Eavesdropping attack, as one of typical security threats in wireless communication systems, has attracted considerable attention. We will observe the physical layer security of an arbitrarily dimensioned wireless network in the presence of an unauthorized attacker. In this paper, we will explain different models of eavesdropping and attacks. Also, we will consider basic performance of the system such are secrecy outage probability (SOP), strictly positive secrecy capacity (SPSC) and average secrecy capacity (ASC) based on a probability density function (PDF) and specific cumulative distribution function (CDF).

Author Biography

Zorica Nikolić, MB University, Faculty of Business and Law

 

 

References

A. Chaudhary and K. Ahmad, “E-commerce Security Through Asymmetric Key Algorithm,” in Fourth International Conference on Communication Systems and Network Technologies E-commerce, 2014, pp. 776–781. doi: 10.1109/CSNT.2014.163.

E. G. Okoro and P. E. Kigho, “The problems and prospects of E-transaction (The Nigerian Perspective),” J. Res. Int. Bus. Manag., vol. 3, no. 1, pp. 10–16, 2013.

C. Amaka, A. Eneh, C. N. Udanor, O. M.O, and U. C. Nduka, “Determining the adoption of e-transaction authentication frameworks in Nigerian Commercial Banks,” Int. J. Eng. Technol., vol. 11, pp. 1108–1115, 2019.

W. Stallings, Cryptography and Network Security (4th Edition), 4th ed. London: Prentice Hall, 2005.

H. Alshehri, “The Influence of Advanced and Secure E-Commerce Environments on Customers Behaviour : The Case of Saudis in the UK,” in 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), 2017, pp. 332–337.

R. Ram and Y. Peres, “Online shop for integrated software , hardware , and human services,” Ibm J. Res. Dev., vol. 58, no. 5, pp. 1–10, 2014.

M. P. Gupta and A. Dubey, “E-Commerce- Study of Privacy , Trust and Security from Consumer’ s Perspective,” Int. J. Comput. Sci. Mob. Comput., vol. 5, no. 6, pp. 224–232, 2016.

S. Khan, “Cyber Security Issues and Challenges in E-Commerce,” Account. Technol. & Inf. Syst. eJournal, 2019.

A. Sanenga, G. A. Mapunda, T. M. L. Jacob, L. Marata, B. Basutli, and J. M. Chuma, “An overview of key technologies in physical layer security,” Entropy, vol. 22, no. 11, pp. 1–34, 2020, doi: 10.3390/e22111261.

J. Singh, “Review of e-Commerce Security Challenges,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 2, pp. 2850–2858, 2014.

S. Badotra and A. Sundas, “A systematic review on security of E-commerce systems,” Int. J. Appl. Sci. Eng., vol. 18, pp. 1–19, 2021.

P. Dijesh, S. S. Babu, and Y. Vijayalakshmi, “Enhancement of e-commerce security through asymmetric key algorithm,” Comput. Commun., vol. 153, pp. 125–134, 2020.

S. Maričić, N. Milošević, D. Drajić, D. Milić, and J. Anastasov, “Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher – Snedecor F Fading Channels,” Electronics, vol. 10, no. 12, p. 1368, 2021, doi: 10.3390/electronics10121368.

M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, 2008, doi: 10.1109/TIT.2008.921908.

L. D. Loganathan, R. Rengaraj, G. Konganathan, and V. Varatharajan, “Physical layer security using an adaptive modulation scheme for improved confidentiality,” IET Commun., vol. 13, no. 20, pp. 3383–3390, 2019, doi: 10.1049/iet-com.2019.0031.

P. Yadav, S. Kumar, and R. Kumar, “A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges,” Trans. Emerg. Telecommun. Technol., vol. 32, no. 9, pp. 1–41, 2021, doi: 10.1002/ett.4270.

E. Alotaibi, “Physical layer security in wireless communications,” p. 295, 2016.

D. Milić, M. Smilić, Z. Nikolić, S. Milosavljević, and A. Tošković, “Influence of Cut-off Level and α-κ-μ Distribution Parameters on Outage Probability and Amount of Fading,” 2022.

A. Mathur, Y. Ai, M. R. Bhatnagar, M. Cheffena, and T. Ohtsuki, “On Physical Layer Security of α-η-κ-μ Fading Channels,” IEEE Commun. Lett., vol. 22, no. 10, pp. 2168–2171, 2018, doi: 10.1109/LCOMM.2018.2860020.

J. M. Moualeu, D. B. Da Costa, W. Hamouda, U. S. Dias, and R. A. A. De Souza, “Physical layer security over α-κ-μ and α-η-μ fading channels,” IEEE Trans. Veh. Technol., vol. 68, no. 1, pp. 1025–1029, 2019, doi: 10.1109/TVT.2018.2884832.

A. Mathur, Y. Ai, M. Cheffena, and G. Kaddoum, “Secrecy Performance of Correlated $alpha$ -$mu$ Fading Channels,” IEEE Commun. Lett., vol. 23, no. 8, pp. 1323–1327, 2019, doi: 10.1109/lcomm.2019.2920347.

J. Y. Wang, C. Liu, J. B. Wang, J. Dai, M. Lin, and M. Chen, “Secrecy Outage Probability Analysis over Malaga-Malaga Fading Channels,” IEEE Int. Conf. Commun., vol. 2018-May, 2018, doi: 10.1109/ICC.2018.8422835.

A. Das, B. Bag, C. Bose, and A. Chandra, “Performance analysis of FSO links employing a transmit and receive diversity-based operating system under Málaga turbulence channels with pointing errors,” Opt. Contin., vol. 1, no. 2, p. 366, 2022, doi: 10.1364/optcon.440786.

Y. Ai, A. Mathur, L. Kong, and M. Cheffena, “Secure Outage Analysis of FSO Communications over Arbitrarily Correlated Málaga Turbulence Channels,”IEEE Trans. Veh. Technol., vol. 70, no. 4, pp. 3961–3965, 2021, doi: 10.1109/TVT.2021.3066219.

Y. Ai, A. Mathur, G. D. Verma, L. Kong, and M. Cheffena, “Comprehensive Physical Layer Security Analysis of FSO Communications over Málaga Channels,” IEEE Photonics J., vol. 12, no. 6, 2020, doi: 10.1109/JPHOT.2020.3036244.

A. K. Majumdar, Principles and Implementation of Secure Free-Space Optical Wireless Communications. 2019. doi: 10.1016/b978-0-12-813365-1.00007-2.

I. Petrovic, Z. Nikolic, M. Stefanovic, S. Panic, P. Spalevic, and D. Bandjur, “Multiple Co-Channel Interferers Influence on Selection Combining over Correlated Weibull Fading Channels,” Frequenz, vol. 66, no. 3–4, pp. 109–113, Jan. 2012, doi: 10.1515/freq-2012-0025.

N. Milosević, M. Č. Stefanović, Z. Nikolić, P. Spalević, and Č. Stefanović, “Performance Analysis of Interference-Limited Mobile-to-Mobile κ–μ Fading Channel,” Wirel. Pers. Commun., vol. 101, no. 3, pp. 1685–1701, 2018, doi: 10.1007/s11277-018-5784-4.

N. Djordjević, B. S. Jaksić, A. Matović, M. Matović, and M. Smilić, “Moments of microdiversity egc receivers and macrodiversity sc receiver output signal

Downloads

Published

2023-07-07

How to Cite

Nikolić, Z., & Smilić, M. (2023). E-COMMERCE PHYSICAL LAYER SECURITY: PERFORMANCE ANALYSIS OF EAVESDROPPER ATTACK IN WIRELESS NETWORKS. MB University International Review, 1(1), 74–80. https://doi.org/10.61837/mbuir010123074n