0% found this document useful (0 votes)
3 views19 pages

Active eavesdropping detection

The paper presents a novel method for detecting active eavesdropping in wireless IoT networks using a deep learning-based BP neural network model. This approach enhances physical layer security by accurately distinguishing between legitimate and eavesdropping signals, achieving up to 19.58% improvement in detection accuracy compared to traditional methods. The study highlights the importance of addressing security challenges in the rapidly expanding IoT landscape, particularly in environments with low signal-to-noise ratios.

Uploaded by

saroat2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views19 pages

Active eavesdropping detection

The paper presents a novel method for detecting active eavesdropping in wireless IoT networks using a deep learning-based BP neural network model. This approach enhances physical layer security by accurately distinguishing between legitimate and eavesdropping signals, achieving up to 19.58% improvement in detection accuracy compared to traditional methods. The study highlights the importance of addressing security challenges in the rapidly expanding IoT landscape, particularly in environments with low signal-to-noise ratios.

Uploaded by

saroat2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Li and Dou  EURASIP Journal on Advances

EURASIP Journal on Advances in Signal Processing (2023) 2023:119


https://doi.org/10.1186/s13634-023-01080-5 in Signal Processing

RESEARCH Open Access

Active eavesdropping detection: a novel


physical layer security in wireless IoT
Mingfang Li1*   and Zheng Dou1

*Correspondence:
limingfang@hrbeu.edu.cn Abstract
1
College of Information Considering the variety of Internet of Things (IoT) device types and access methods, it
and Communication remains necessary to address the security challenges we currently encounter. Physi-
Engineering, Harbin Engineering cal layer security (PLS) can offer streamlined security solutions for the next generation
University, Nantong Street,
Harbin 150001, China of IoT networks. Presently, we are witnessing the application of intelligent technolo-
gies including machine learning (ML) and artificial intelligence (AI) for precise preven-
tion or detection of security breaches. Active eavesdropping detection is a physical
layer security-based method that can differentiate wireless signals between wireless
devices through feature classification. However, the operation of numerous IoT devices
operate in environments characterized by low signal-to-noise ratios (SNR), and active
eavesdropping attack detection during communication is rarely studied. We assume
that the wireless system comprising an access point (AP), K authorized users and a pro-
active eavesdropper (E), following the framework of transforming wireless signals at AP
into organized datasets that this article proposes a BP neural network model based
on deep learning as a classifier to distinguish eavesdropping and non-eavesdropping
attack signals. By conducting experiments under SNRs, the numerical results show
that the proposed model has stronger robustness and detection accuracy can signifi-
cantly improve the up to 19.58% compared with the reference approach, which show
the superiority of our proposed method.
Keywords: Deep learning, Internet of things (IoT), Physical layer security, Active
eavesdropping detection, BP neural network

1 Introduction
In recent years, global IoT devices have continued to be deployed on a large scale, with
a strong growth in the number of connections, widely used in various fields of produc-
tion and life. It is expected that by the end of 2023, more than 43 billion devices world-
wide will be connected to the IoT. The cognitive allocation of spectrum resources and
spectrum prediction in the IoT can ensure efficient communication between different
devices and users, minimize interference and conflicts, and spectrum prediction is cru-
cial for supporting the transmission of wireless communication signals [1, 2]. While
engaging with a variety of different devices, the wireless channels, due to their open
nature, can potentially be exploited by unauthorized devices within signal range to inter-
cept and pilfer signals, thereby compromising the security of the wireless IoT system.

© The Author(s) 2023. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits
use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original
author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third
party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the mate-
rial. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or
exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://
creativecommons.org/licenses/by/4.0/.
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 2 of 19

The IoT network has become the target of illegal attacks, which poses great risks and
challenges to the security of wireless IoT systems. In order to ensure network security,
intrusion detection for wireless access is necessary.
Wireless communication networks as a part of the IoT plays an important role in
the IoT. However, with the development of wireless communication technology, any
two users in a wireless network can freely establish a connection, which causes an
increasing scarcity of spectrum resources but also leads to a wide range of infor-
mation leakage and adversarial attack problems, such as eavesdropping attacks and
spoofing attacks. It reduces network availability and information transmission secu-
rity[3]. [4] proposed an information security transmission scheme for IoT termi-
nals under the joint optimization of done trajectory and resource allocation in the
presence of eavesdroppers. Traditional upper layer encryption technology has many
limitations, so PLS has become a potential solution to this problem. PLS plays a criti-
cal role in wireless communication and distinguishes itself from cryptographic tech-
niques. It serves as a complementary approach to upper-layer cryptographic methods.
The fundamental concept of PLS revolves around harnessing the inherent properties
and vulnerabilities of wireless channels to establish secure communication at the
physical layer (PHY). Many research solutions have been proposed regarding PLS, [5]
proposed cognitive user imitation attacks that occur during spectrum switching in
cognitive radio networks and utilize artificial intelligence technology to make effec-
tive autonomous decisions. The PHY transmission of cognitive radio networks based
on nonorthogonal multiple access faces dual threats of primary user interference and
third-party eavesdropping. A unmanned aerial vehicle assisted covert communication
model to address the security threats faced in the process of air to ground communi-
cation, and maximized average concealment rate under illegal interception and com-
plete secure transmission was proposed in [6]. A new method in the study of physical
layer security was discussed, which proposed probabilistic security features and the
use of wireless maps to capture uncertainty in wireless environments, especially in
eavesdropper channels [7]. In the presence of multiple active eavesdroppers, a closed
form expression for the optimal power allocation strategy for transmitting signals and
artificial noise (AN) was obtained and the minimum transmission power required
to ensure reliable and secure communication was found in [8]. A new beamforming
scheme to improve the reliability or security of the physical layer of integrated 5 G
satellite networks was pointed in [9]. In order to improve the survivability and flexible
scheduling ability of the 6th generation IoT drone wireless power supply communica-
tion system, a multi-drone trajectory and wireless scheduling resource scheme was
designed in [10]. Most of the existing work emphasizes secure transmission strategies,
evaluating the security performance of wireless transmission through secure inter-
ruption probability, positive confidentiality probability, and interception probability.
[11] focused on solving security issues in IoT access authentication and proposed an
optimized radio frequency fingerprinting (RFF) classification algorithm. [12] utilized
RF characteristics to achieve efficient signal source recognition in limited resource
situations, which is usually different from transmitting signals. [13] proposed physi-
cal layer security authentication method for wireless RF fingerprint recognition. [14]
studied a new long tail specific radiation source identification method is proposed for
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 3 of 19

aircraft recognition. Most of these tasks are based on RF fingerprints to identify and
authenticate physical layer devices. This is different from the active eavesdropping
detection proposed in this article. Our goal is to detect the presence of eavesdroppers
during wireless access, without focusing on the specific identity of the target. There-
fore, eavesdropping detection for wireless communication signals is also crucial for
physical layer security.
Security in the physical layer is generally defined through the concept of informa-
tion theory. A common channel model for secure communication is the eavesdrop-
ping channel [15], where the sending node attempts to send confidential information
and transmits it reliably to a legitimate receiving node while avoiding illegal attacks from
eavesdropping nodes during transmission. In PLS, eavesdroppers usually are divided
into two types of eavesdropping, namely passive eavesdropping that only listens without
attacking and active eavesdropping that takes active attack who impersonates as legiti-
mate users. Usually active eavesdroppers are more damaging because active eavesdrop-
ping initiates attacks that result in greater information leakage. The active eavesdropping
attacks in conventional communication systems include frequency-conducting spoofing
attacks and active eavesdropping attacks during data transmission. The former is differ-
ent from the latter in that the eavesdropper (E) sends the same (frequency-conducting)
signal that is synchronized with the legitimate user [16]. Active eavesdroppers during
data transmission can enhance information eavesdropping by broadcasting their own
continuous wave signals [17], and a scheme based on active eavesdropping with rotated
jamming to achieve wireless surveillance is considered in [18], where a legitimate eaves-
dropper (The reason why legitimate eavesdropper is mentioned here is because in this
literature, eavesdropping link is used as legitimate surveillance link) performs informa-
tion interception while the auxiliary jamming node interferes with the suspect link to
successfully achieve legitimate eavesdropping. In recent years, due to energy constraints,
for example in UAV communications, active eavesdropping techniques have received a
lot of attention. It assumes that the suspicious link can detect wireless eavesdropping,
covert surveillance is achieved by active eavesdropping [19]. It follows that there is an
urgent need to implement effective anomaly detection with the aim of enhancing the
reliability and availability of communication systems and to minimize the probability of
interception.
This paper presents a novel approach where we put forward to build a neural network
model to learn and classify datasets under the framework of deep learning, and intro-
duce the discriminative loss functions into the training of the model. Compared with
using the ML algorithm, the suggested approach demonstrates higher accuracy levels
in learning data features, and the classification effect is significantly improved. Experi-
ments have shown that reliable eavesdropping detection capabilities can be achieved for
different eavesdropping attack scenarios by our solution approach.
The subsequent sections of this paper are arranged as follows: Section 2 is a summary
of related works. Section 3 provides the system model. We introduce wireless communi-
cation systems with eavesdroppers and create a framework for wireless signal datasets.
Section 4 describes the detection method based on machine learning. Section 5 presents
a deep learning-based BP neural network eavesdropping detection scheme. Section 6
mainly analyzes the detection performance evaluation of different algorithms.
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 4 of 19

2 Related works
Intrusion detection is not only the main security problem addressed by the network
layer, but also a problem that must be solved by the physical layer. Common intrusion
detection algorithms include ML such as Bayesian networks, clustering analysis, support
vector machine (SVM) and DL for example recurrent neural networks (RNN) and CNN
for classification and prediction. This section primarily discusses detection approaches
that utilize ML and DL techniques.
Machine learning techniques have been widely applied in anomaly detection, rec-
ognition, and text classification, and have achieved impressive results. Reference [20]
discussed improving intrusion detection performance based on ML classifiers through
feature selection in cyber-physical systems. Reference [21] proposed a new dual ended
machine learning model to improve the prediction accuracy and real-time performance
of heterogeneous spectral states. In a cognitive eavesdropping environment, Reference
[22] adopted distributed machine learning algorithms are used to optimize the alloca-
tion ratio of secondary device resources to ensure the quality of service for users with
higher task priorities. The author of [23] using the relationship between transmitted and
received signals considering the transmission process to build a dataset and using SVM
algorithm to classify eavesdropping and legitimate signals, but the detection accuracy of
binary classification is not very high. Reference [24] utilized a lightweight network com-
posed of BP neural network, auto regressive integral moving average model, and SVM to
achieve intrusion detection and recognition. Reference [25] studied UAV wireless relay
systems in the presence of active eavesdroppers and used single-class SVM and K-means
clustering analysis to build predictive models to detect eavesdropping attacks, the study
no longer considered general wireless systems but focused on UAV-assisted wireless
systems, however, UAVs have limited energy and cannot directly detect eavesdropping
attacks. Reference [26] used machine learning to process the actual propagation process
of wireless signals and used Gaussian mixture model for classification. Reference [27]
relied on Gaussian mixture model to identify spoofing attacks. Reference [28] consid-
ered reinforcement learning to detect spoofing attacks and achieve PLS authentication.
Reference [29] utilized reinforcement learning algorithms in machine learning for spec-
trum sensing to quickly detect the required idle channels. Most of these works are based
on ML for classification or detection but basically not really considered the actual detec-
tion capabilities of wireless access points.
Deep learning plays an important role in classification and recognition. Reference [30]
studied the impact of adversarial attacks on device recognition based on CNN. Refer-
ence [31] proposed a dual denoising autoencoder approach to enhance the security of
cyber physical systems by preventing eavesdropped. Reference [32] investigated the use
of a bait detection scheme to bait malicious nodes to send fake routing responses to
detect malicious nodes, and then using cryptographic encryption techniques to encode
to avoid malicious eavesdropping. A defense strategy for spectrum sensing data forgery
and eavesdropping hybrid attacks in Nakagami-m fading channels in cognitive radio net-
works is suggested as a means to attain both energy efficiency and physical layer security
in [33]. A complex CNN for identifying signal spectrum information for multi-signal
frequency domain detection and recognition is constructed in [34]. Using deep learning
and few sample learning methods to identify different emitters based on RF fingerprint
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 5 of 19

features in [35]. Classification tests are performed on public UCI datasets by deep con-
volutional neural networks and good performance is achieved in [36]. Implementation of
wireless network security through self supervised learning and adversarial enhancement
based few shot SEI method for transmitter authentication in [37]. Classification algo-
rithms based on DL have progressively gained widespread acceptance as mainstream
methodologies. However, deep learning is widely used in images, voice, video, text and
other data classification problems such as radio signal recognition [38], where the data is
public and more complex, and there is little research on classification of structured fea-
ture vector samples on eavesdropping attacks directly.
In this paper, we reframe the detection problem as a classification task to optimize
the solution, which is traditionally solved based on ML algorithms. Therefore, this arti-
cle mainly addresses the issue of active eavesdropping detection in the wireless access
process of general wireless systems. In order to enhance the performance of eavesdrop-
ping detection as well as the accuracy of signal classification, we build on the idea of [23,
25] to generate test data from wireless signals, by using statistical knowledge of channel
state information (CSI) to create a wireless signal dataset framework, and then artificial
training data is created to input the data into ML and BP models. According to the char-
acteristics of the dataset, a BP neural network model based on deep learning architec-
ture has been proposed.

3 System model and creating dataset


3.1 System model
In this paper, the problem of active eavesdropping detection is studied. The classic eaves-
dropping model is shown in Fig. 1a. While the source node communicates with the desti-
nation node, there is a possibility that unauthorized eavesdroppers (referred to as E) may
intercept the communication and employ deceptive techniques to mislead the destination
node, thereby achieving their eavesdropping objectives. Our system model, as shown in
Fig. 1b, a general wireless system that mainly solves the problem of active eavesdropping
detection. The paper considers the system consisting of a single access point (AP), K author-
ized users, and active eavesdroppers (E) as seen in Fig. 1b. Each individual node is outfitted
with a sole antenna, and the placement of them are randomized. The wireless channel con-
necting the AP and the k-th user is expressed as gk . Likewise, the communication channel

Fig. 1 System model diagram


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 6 of 19

connecting the AP and E is expressed as gE . Usually the wireless communication is divided


into the uplink and downlink two phases.
In the uplink, the user sends the pilot sequence to the AP to request communication,
and the AP performs channel estimation and identity authentication based on the pilot
sequence. Assume that the pilot signal transmitted by the user k to the AP as pk , pk ∈ CL×1
is referred to as a vector arranged in a column consisting of L entries, and �pk �2 = 1.
Among any two different users, that is when k = k ′, p†k pk ′ = 0. If a malicious node E
launches an attack to steal message sk between user k and the AP, it will design the same
pilot sequence pE as the pk , and send it to the AP. At this time, the AP mistook it as the
message request of two legitimate users. When the message is returned to the user, it will
also be returned to E. Hence, the confidential information is inevitably leaked to E. That is,
the SNR of the k-th user decreases as the power of E increases.
When E appears in the uplink and be proactive, it will result in a lower data rate for the
user. Therefore, the disparity in data rates between user k and E, i.e., the channel capacity,
becomes lower.
In the downlink transmission, the AP disseminates signals to the legitimates recipients.
Of course, E will also receive these signals. It can be seen that the research on the detection
problem of eavesdropping is very meaningful. If the existence of E is detected, we can stop
the communication at any time or take confidential measures such as the convert transmis-
sion to reduce the risk of information leakage.
The focus of this study is the detectability of eavesdropping during the uplink communi-
cation, because accurate detection of eavesdropping can better realize attack identification
and further complete identity authentication.
According to the spirit of the dataset framework cited in [23], the idea of using the cor-
relation between the signal transmitted and the signal received to consider the transmis-
sion process is introduced into the representation learning of wireless signal features. When
user k sends a message requesting communication to the AP, E will steal its message and
imitate k while transmitting it to the AP. The only message available to the AP are received
signals. At the t-th time slot, the signal received by the AP can be given by
K
Lpu k=1 pk gk [t] + n[t], non − eavesdropping
yAP [t] = (1)
K
Lpu k=1 pk gk [t] + LpE pE gE [t] + n[t], eavesdropping,

where pu  Pu /N0 , pE  PE /N0. In this equation, Pu and PE refer to the mean transmit-
ting power per user and E; N0 represents the average noise power per receiving antenna;
n is the additive white Gaussian noise (AWGN) vector with n ∼ N (0, IL ). yAP [t], gk [t],
gE [t] and n[t] are the representations of yAP , gk , gE and n at time t.

3.2 Creating feature dataset


This section mainly creates a feature dataset framework. We use (1) to obtain the signal
yAP [t] received at AP. Assuming that the pilot vector p†k transformation processing with
yk [t]= p†k yAP [t], we can obtain yk [t],
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 7 of 19

 Lpu gk [t] + p†k n[t],


�
non − eavesdropping
yk [t] = (2)
LpE gE [t] + p†k n[t],
� �
Lpu gk [t] + eavesdropping.

Let ak [t]  |yk [t]|2, then two values can be calculated at AP:
(1)
Mk  Et ak [t], (3)

(2) Et ak [t]−Ek |p†k n[t]|2


Mk  Ek |p†k n[t]|2
, (4)

according to sufficient statistical knowledge, it should be noted that Et {•} ≡ E{gk }K , gE ,


k=1
n{·} are dependent on {gk }Kk=1, gE , n at t.
In the actual communication process, a user will send the pilot to the AP more than
once when accessing the wireless network. Suppose that user sends the pilot vector T
times, then there will be different values at AP, ak [1]...... ak [T ]. According to (3) and (4), a
dataset consisting of the following two eigenvalues can be created at AP:
Attribute 1 (Mean):

(1)
1
T  Ak|H0 [T ], non − eavesdropping

(1)

Ak [T ]  ak [t] = (5)
T  A(1) [T ], eavesdropping,

t=1
k|H1

where H0 indicates the state of absence of an eavesdropper, and H1 indicates the state
that there is an eavesdropper.
Attribute 2 (Ratio):

(2)
�T �T † 2  Ak|H0 [T ], non − eavesdropping

(2) a [t]− |p n[t]|
Ak [T ]  t=1 �k T †t=1 2k = (6)
t=1 |pk n[t]|  A(2) [T ], eavesdropping.

k|H1

When the AP acquires a substantial size of samples (i.e., when T reaches a significant
value), then
(1) (1)
Ak [T ] ≈ Mk , (7)

Table 1 Features data: T points are related to eavesdropping, T points are not related to
eavesdropping
Mean Ratio

(1) (2)
Ak|H0 [T1 ] Ak|H0 [T1 ]
... ...
(1) (2)
Ak|H0 [T ] Ak|H0 [T ]
(1) (2)
Ak|H1 [T1 ] Ak|H1 [T1 ]
... ...
(1) (2)
Ak|H1 [T ] Ak|H1 [T ]
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 8 of 19

(2) (2)
Ak [T ] ≈ Mk . (8)

According to (2), (3) and (4), we convert the received signal to get the features data as the
following tabular fashion of Table 1:
The training dataset starts from the T1-th time slot data points, and when T1 = 1,
explain that all gathered data points during the uplink slots been used. Otherwise,
T1 > 1, only T − T1 data points during the T1-th to the T -th time period be used. The
location of the t -th data point in the two-dimensional space can be described as
(1) (2)
Ak [t], Ak [t] . k indicates that we are detecting whether user k is under an eaves-
dropping attack.
According to (5) and (6), we can get labeled artificial training data sets for SVM
algorithm and BP neural network model, as the following form of Table 2:

4 Eavesdropping detection with machine learning


ML and DL are common outlier detection algorithms, so before introducing our
scheme, we first introduce the classic k-means++ and SVM methods that currently
used, the ATD is inputted in them and our proposed method, then compare and ana-
lyze the detection performance of these three methods in experiments.

4.1 K‑means++ clustering
Clustering algorithm is an unsupervised machine learning algorithm. K-means++ is
an enhanced variant of the k-means clustering algorithm that is specifically devised
to initialize cluster centers more efficiently, thereby improving clustering quality
and algorithm performance. The k-means++ algorithm uses a smarter initialization
method to select initial cluster centers to better represent the entire dataset, thereby
reducing the risk of the algorithm falling into a local optimal solution. Because it’s a
binary classification problem (eavesdropping and non-eavesdropping), we set k=2. In
this paper, ATD will be used for clustering model.
Specifically, the initialization procedure of the k-means++ algorithm proceeds
obey the following manner:

1. Choose a sample from the dataset at random to serve as the initial cluster center.

Table 2 ATD: Labeled T points are related to eavesdropping, T points are not related to
eavesdropping
Mean Ratio Labels

(1) (2) (0)


Ak|H0 [T1 ] Ak|H0 [T1 ]
... ... ...
(1) (2) (0)
Ak|H0 [T ] Ak|H0 [T ]
(1) (2) (1)
Ak|H1 [T1 ] Ak|H1 [T1 ]
... ... ...
(1) (2) (1)
Ak|H1 [T ] Ak|H1 [T ]
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 9 of 19

2. Compute the minimum distance among every data point and the current cluster
center (i.e., the proximity to the closest cluster center), and choose the data point
with the maximum distance conducting the next cluster center.
3. Iterate step 2 until k cluster centers are selected. It should be noted that the
k-means++ algorithm requires significant computational resources due to its high
computational complexity, especially when dealing with large-scale data sets.

4.2 SVM classifier
SVM is among the frequently utilized methods in ML. In the field of ML, it is a binary clas-
sifier with strong learning and generalization capabilities [39]. The fundamental model aims
to establish a linear classifier that maximizes the margin within the feature space. In actual
samples, many labeled samples are linearly indivisible, then the kernel trick can better han-
dle this issue. In this paper, mainly conducts experiments with RBF kernel. The SVM takes
the optimal separation hyperplane as the decision plane as Fig. 2 shown. Therefore, finding
the maximum margin is the main optimization problem.
The optimal hyperplane optimization problem can be formulated by

1
min �w�2 = 1
w, b 2
   (9)
s.t yi w T · xi + b ≥ 1, i = 1, ..., N ,

where N represents the total count of trained samples, xi signifies the i -th sample data
vector of the input. yi denotes the i -th sample label. yi = +1, if xi is labelled as 0; oth-
erwise, yi = −1 if xi as -1. The hyperplane shown in Fig. 2 is located between the two
dividing lines, satisfying the �w · x� + b = 0. 1/w2 representing the Euclidean distance
from one edge to the hyperplane, the goal of (9) is to maximize the width of the two
edges 2/w2 to correctly separate samples.
For data that cannot be linearly separated, we introduce relaxation variable ξi, then we
control the size of relaxation variables to achieve the optimal classification of the dataset.

Fig. 2 Optimal hyperplane of SVM


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 10 of 19

The optimal hyperplane can be obtained through the optimization problem described as
follows:
N
1 
min �w�2 = 1 + C ξi
w, b, ξn 2
i=1 (10)
 
s.t. yi w T · xi + b ≥ 1 − ξi , ξi ≥ 0.

C is the regularization coefficient. When ξi = 0, the point falls on the edge of the max-
imum interval, indicating that the data is correctly classified. If 0 < ξi < 1, the points
fall within the maximum interval, indicating that the data are correctly classified; as if
ξi = 1, the point falls on the hyperplane and the data is correctly classified; otherwise
data errors classification. According to the Lagrangian function and the KKT condition
[23], the optimization problem can be described by (11)
N N
 1 
max i − i j yi yj K (xi , xj )
1 ...T 2
i=1 i=1, j=1
(11)
T

s.t. xi yi = 0 0  i  C, i ∈ � .
i=1

K (xi , xj ) denotes the vector inner product of the defined kernel function, mapping
indistinguishable nonlinear data to a high-dimensional space for classification. i is a
Lagrange multiplier.

5 Eavesdropping detection with deep learning


In this section, we present a DL-based detection scheme using a BP neural network
within the framework of deep learning. The paper first introduces deep learning into the
wireless communication wiretapping detection.
Artificial neural network (ANN) can be described as a complex and interconnected
system of adaptive neurons, the structure of ANN simulates mutually engage responses

Fig. 3 BP neural network diagram


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 11 of 19

of the biological nervous system to visible stimuli. ANN possess the capacity for self-
learning, self-organization, good error tolerant and outstanding nonlinear approxima-
tion capabilities. BP neural network is a type of multilayer feedforward neural network
that training using the deviation backpropagation algorithm, and it is recognized as the
most extensively employed neural network architectures.
As Fig. 3 shown, it is a typical 3-layer BP neural network diagram. No informa-
tion interacted between neurons in the identical layer, and information is transferred
between different layers according to the connection weight [40]. Its basic principle is
to adjust the network weights and thresholds through the gradient descent algorithm,
so that the discrepancy between the obtained output and the desired output is mini-
mal or zero [41]. We designate the hidden layer to consist of 10 neurons, and use the
output of this layer as the input of the next layer to attain the prediction outcome of
the final classification, thus completing the construction of a typical BP neural net-
work model. The BP neural network exhibits robust capabilities in nonlinear map-
ping and offers a versatile network structure. Using the BP model built above to train
and classify the dataset, and adjust the constants associated with the feature values to
achieve the best classification performance.
To enhance the accuracy of assessment while mitigating the risk of eavesdropping
attacks, we conduct active wiretapping detection based on the model proposed above.
As shown in Fig. 4 is the detection and training process based on wireless signal fea-
tures, including the data processing phase and the model training and debugging
phase. First, the wireless signal received during the wireless communication is pro-
cessed to obtain a dataset of characteristic attributes and perform minimum-maxi-
mum normalization on it. Tensioning the dataset and input it into the BP model for
training and testing. Then adjust the parameters of classifier selection and loss func-
tion and optimization function to fine-tune the model. Finally, the detection task of
eavesdropping signal is completed.
The experiment is conducted using the PyTorch DL Framework as the implemen-
tation platform. 70% of the constructed dataset as the training examples for model
training, and the leftover 30% as the testing data to test the performance of the model.
During each model training process, different percentage divisions between the train-
ing and test sets can be set to enhance the authenticity and credibility of the results.
We select the sigmoid function as the Activation function. The Adam optimizer is
employed for modifying the learning rate,and Softmax + Cross-entropy loss is used

Fig. 4 BP neural network algorithm overall flow chart


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 12 of 19

as the classification loss function to expedite data calculation and make the numerical
stability better. The softmax function is a discriminative function, and the output is a
probability distribution. The difference in the probability of classification categories is
more significant, and the form of the output distribution is closer to the real distribu-
tion. Here, the function expression is given as

exi
Softmax(x) = x . (12)
�j e j

Cross-entropy loss is calculated as:


2

Loss = − yi log ŷi , (13)
i=1

where y is the true distribution, ŷi is the network output distribution, j is the number of
categories. Cross-entropy loss in the PyTorch deep learning framework combines soft-
max and cross-entropy to compute. The final calculation formula is as follows:
 
Loss(x, class) = − log exp(x[class])
�j exp(x[j])
   (14)
= −x[class] + log �j exp x[j] .

So the last layer of model prediction, loss and learning processes can be expressed as
Fig. 5:

6 Performance evaluations
In our experiment, we will give several numerical examples as specific condition settings.
Considering that there may be some changes in the state of radio signals in the actual trans-
mission environment [42], following the propagation of electromagnetic waves through vari-
ous paths, Rayleigh fading is employed to represent the phenomenon of channel fading. Let
√ √
gk = βk hk , gE = βE hE, βk and βE represent the path loss. hk ∼ ℓN (0, 1), hE ∼ ℓN (0, 1).
Set dataset parameters: K = 4, L = 10, pu = pE = 5, βk = βE = 1, T1 = 1. For the TC-

 ′

SVM classifier, we choose the RBF kernel function, K (x, x ) = exp γ �x − x �22 , let γ = 0.5,
C=1. Set DL learning rate: l=0.05.
In order to better measure and distinct performance in detecting anomalies of
k-means++, SVM which are to compare and the BP neural network algorithm classifica-
tion proposed in this paper, a comprehensive analysis has been conducted from the aspects
of accuracy, precision, F1 score, ROC curve, Sun of Squared Errors (SSE), Silhouette Coef-
ficient (SC) and Calinski-Harabasz Index (CK Index).

Fig. 5 BP neural network prediction, loss acquisition and learning process


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 13 of 19

Table 3 Comparison of the accuracy of different models


Model T n = 200 (%) n = 2000 (%) n = 4000
(%)

K-means++ 10 62.50 61.67 63.33


20 62.58 64.92 59.58
50 57.83 43.88 58.63
SVM 10 76.25 82.50 83.75
20 79.50 86.00 86.63
50 80.87 91.56 89.00
BP 10 95.83 96.25 97.50
20 94.98 96.20 98.84
50 90.93 92.70 97.20

Fig. 6 SSE, SC and CH index in different cases

6.1 Comparison of accuracy of three algorithms under the same SNR


Accuracy serves as a metric to assess the performance of a classifier. We use the accuracy
rate to judge the probability of accurately distinguishing eavesdropping signals from non-
eavesdropping signals. It is calculated as
TP+TN
ACC = TP+TN +FP+FN , (15)

where TP refers to instances that non-tapping samples are corrected classified, TN indi-
cates that the eavesdropping samples are correctly classified, FP refers classifying non-
tapping samples into eavesdropping samples and FN means classifying eavesdropping
samples into non-tapping samples.
To bear out the effectiveness and accuracy of the BP model in wiretapping detec-
tion, this paper conducts comparative experiments on datasets in different scenarios
on various models. The results of the experiments are presented in Table 3.
T represents the number of pilots sent by a single user, the size of samples (n) indi-
cates the quantity of samples with a label of 0 (or label of 1). The feature composition
of the dataset is composed of Mean and Ratio as shown in Table 2, and the experi-
ment was conducted at SNR=10 dB. Comparing the results in Table 3, it becomes
obvious that using BP neural network as a classifier is able to obtain higher detection
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 14 of 19

accuracy. We found that the k-means++ clustering effect is not ideal. So we use the
common evaluation indexes of clustering algorithm SSE, SC and CK Index to meas-
ure the clustering effect of k-means++ algorithm. The results of the above nine data
sets are shown in Fig. 6 (The x-axis n − T refers to (200-10, 200-20, 200-50, 2000-10,...
4000-50)).
SSE is one of the most common metrics used to evaluate the effect of clustering,
and its smaller value indicates better clustering effect. The SC is used to evaluate the
tightness and separation of the clusters, and a larger value indicates that the cluster
in which the data point is located is more reasonable. CH Index is a kind of index to
evaluate the effect of clustering, and the higher value indicates the better clustering
effect. According to Fig. 6, we can see that under different T conditions when n is the
same, the SSE curve shows an overall upward trend, the SC curve shows an overall
downward trend, and the CH curve shows an overall downward trend; When T is the
same and under different n conditions, as T increases, the SSE value increases, the
SC value decreases, and the CH value increases. Therefore, based on comprehensive
analysis, the k-means++algorithm is not suitable.
Comparing SVM algorithm and BP neural network, we found that under the same
sample size, the detection accuracy of both classifiers escalates with the raises of T, and
the BP model exhibits superior detection performance compared to the SVM method.
As the sample size increases, there is an overall inclination of the SVM detection accu-
racy is increasing, which has little effect on the detection results of BP model. We visual-
ize the classification effect as shown in Fig. 7 where in the case of n = 200, T = 10. Fig
(a) shows the classification results based on SVM algorithm for the reference we com-
pared, while Fig (b) shows the classification performance of the proposed BP neural net-
work. Based on the comparison, it is evident that the classification performance of the
BP neural network classifier proposed in this article is better.

Fig. 7 SVM and BP classification comparison chart


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 15 of 19

Table 4 Comparison of experimental results with different indicators under different SNRs
SNR (dB) Precision F1 Score
SVM (%) BP (%) SVM (%) BP (%)

−8 70.54 84.18 82.72 91.41


−6 70.54 80.15 82.72 88.98
−4 70.54 70.69 82.72 82.83
−2 70.54 71.07 82.72 83.41
0 71.79 69.02 83.58 81.67
2 70.92 72.14 82.98 83.82
4 73.01 71.19 84.40 83.17
6 73.71 70.36 87.45 82.60
8 74.67 93.11 85.50 96.43
10 78.52 94.30 87.97 97.07
12 84.40 95.92 91.54 97.92
14 83.33 96.36 90.90 97.83
16 83.98 98.85 91.29 99.42
18 88.67 98.23 93.99 93.11
20 86.26 97.50 92.62 98.73

Fig. 8 SVM and BP classification comparison chart

6.2 Comparison of precision and F1 scores between SVM and BP neural networks


under different signal‑to‑noise ratios
Different from [22], in addition to comparing accuracy, we have also added new com-
parative indicators under different SNRs. When E launches an eavesdropping attack
on the uplink, the SNR of the k -th user will decrease as the power of E increases. SNR
can also be used to judge whether the signal is interfered. If the SNR is low, it means
that the signal quality is poor and there is more noise in the signal. Therefore, SNR is
a very important parameter that can serves as metrics for assessing algorithm perfor-
mance. Hence, we analyze the behavior of the SVM algorithm and proposed in this
paper by comparing the precision and F1 score under different SNR when n=2000,
T=10. We summarize the experimental data in Table 4.
Precision measures the accuracy of the model in predicting non-tapping samples,
the F1 score represents the balanced measure of precision and recall, calculated as
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 16 of 19

their harmonic mean, taking into account the accuracy and completeness of the
model. According to the results in Table 4, we can find that our proposed BP neu-
ral network is almost always higher than SVM in precision and F1 score. To further
enhance the validity of the model in this paper, we give the ROC curve plot for one of
the cases as shown in Fig. 8.
On the ROC curve, the Area Under the Curve (AUC) indicates the performance
of the algorithm, and the effectiveness is indicated by a higher AUC value, with a
value closer to 1 indicating superior performance. ROC curve can help us make more
objective decisions in model evaluation and selection.
It can be seen that the classification effect of the BP neural network classifier proposed
in this paper is better. Comprehensive analysis shows that the deep learning-based BP
neural network model performs satisfactorily, and it performs better in wireless commu-
nication eavesdropping detection scenarios.

7 Conclusion and future work


This paper mainly focuses on the research of physical layer security issues. Unlike exist-
ing work, we did not directly mention performance indicators for physical layer security,
such as confidentiality capacity, interruption probability, and interception probability.
The main goal of active eavesdropping attacks is to obtain sensitive information about
communication by monitoring network traffic and intercepting wireless signals, with-
out being observed by both parties, which undermines the confidentiality of communi-
cation. Therefore, the paper focuses on the research of active eavesdropping detection
in the physical layer and models the detection problem as a signal classification prob-
lem, mainly focusing on the classification performance of the model for the presence
or absence of eavesdroppers. By detecting active eavesdropping attacks, communica-
tion can be stopped in a timely manner to further adopt more effective transmission
strategies, which can further prevent more serious attacks such as man in the middle
attacks. Therefore, excellent active eavesdropping attack detection performance can help
improve the confidentiality of physical layer secure communication.
In this paper, a new methodology to detect active wiretapping is presented for physical
layer security based on deep learning. The method uses the BP neural network model
to learn and classify the structured eigenvectors of wireless communication signals,
and optimizes different parameters in the detection task to raise the active wiretap-
ping detection property of the algorithm. Compared to the references, we have added
experiments under different SNR conditions, and the model’s effectiveness is validated
through extensive experimentation on diverse datasets, yielding compelling results since
the characteristics of the data itself will have a more obvious impact on the classification
effect.
In the real world of the IoT wireless network, the access and exit of user devices are
constantly changing, and the channel environment is also constantly changing. This
article considers the situation based on static, which is also the limitation in the appli-
cation of the model, which cannot be fully adaptive learning. In the wireless communi-
cation scenario proposed in this article, there is no limit on the number of access users.
Therefore, in order to better adapt to future research on physical layer security issues in
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 17 of 19

wireless communication, we will collect real-world wireless signals to further verify the
identity authentication problem of user devices in dynamic access and exit environments
to improve the detection performance of active physical layer attacks. We will also con-
tinuously improve the model by introducing new mechanisms such as incremental
learning and attention mechanisms to achieve adaptive dynamic learning in large-scale
complex communication electromagnetic environments.
If any of the sections are not relevant to your manuscript, please include the heading
and write ‘Not applicable’ for that section.

Abbreviations
IoT Internet of things
PLS Physical layer security
ML Machine learning
AI Artificial intelligence
DL Deep learning
CNN Convolutional neural network
SNR Signal-to-noise
BP Backpropagation
PHY Physical layer
STBC Space time block coding
AN Artificial noise
RFF Radio frequency finger
E Eavesdropper
UAV Unmanned aerial vehicle
SVM Support vector machine
RNN Recurrent neural network
ATD Artificial training dataset
CSI Channel state information
AP Access point
ANN Artificial neural network
SSE Sum of squared errors
CK Index Calinski-Harabasz Index
SC Silhouette coefficient
AUC​ Area under the curve

Acknowledgements
Not applicable.

Author contributions
ML proposed the original concept of the paper and completed the manuscript and revisions. ZD contributed to the
review, editing and supervision.

Funding
None.

Availability of data and materials


The data supporting of the findings are included in the article. Please contact the author if any help needs.

Declarations
Ethics approval and consent to participate
Not applicable.

Consent for publication


Not applicable.

Competing interests
The authors declare that they have no competing interests.

Received: 16 September 2023 Accepted: 3 November 2023


Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 18 of 19

References
1. X. Liu, H. Ding, S. Hu, Uplink resource allocation for NOMA-based hybrid spectrum access in 6G-enabled cognitive
internet of things. IEEE Internet Things J. 8(20), 15049–15058 (2021)
2. S. Li, Y. Sun, Y. Han, Y. Tu, O. Alfarraj, A. Tolba, P. Sharma, A novel joint time-frequency spectrum resources sustainable
risk prediction algorithm based on TFBRL network for the electromagnetic environment. Sustainability 15(6), 4777
(2023)
3. Y. Lin, H. Zhao, X. Ma, Y. Tu, M. Wang, Adversarial attacks in modulation recognition with convolutional neural net-
works. IEEE Trans. Reliab. 70(1), 389–401 (2021)
4. Z. Na, C. Ji, B. Lin, N. Zhang, Joint optimization of trajectory and resource allocation in secure UAV relaying commu-
nications for internet of things. IEEE Internet Things J. 9(17), 16284–16296 (2022)
5. G. Rathee, N. Jaglan, S. Garg, B.J. Choi, D.N.K. Jayakody, Handoff security using artificial neural networks in cognitive
radio networks. IEEE Internet Things Mag. 3(4), 20–28 (2020)
6. Y. Liu, Z. Na, Y. Zhang, X. Qin, B. Lin, Multi-UAV-assisted covert communications for secure content delivery in inter-
net of things. Comput. Commun. 210, 138–146 (2023)
7. Z. Utkovski, P. Agostini, M. Frey, I. Bjelakovic, S. Stanczak, Learning radio maps for physical-layer security in the radio
access. In: 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications
(SPAWC), Cannes, France, pp. 1–5 (2019)
8. Y. Wu, R. Schober, D.W.K. Ng, C. Xiao, G. Caire, Secure massive MIMO transmission with an active eavesdropper. IEEE
Trans. Inf. Theory 62(7), 3880–3900 (2016)
9. M. Lin, Q. Huang, C. Tomaso et al., Integrated 5G-satellite networks: a perspective on physical layer reliability and
security. IEEE Wirel. Commun. 27(6), 152–159 (2020)
10. J. Wang, Z. Na, X. Liu, Collaborative design of multi-UAV trajectory and resource scheduling for 6G-enabled internet
of things. IEEE Internet Things J. 8(20), 15096–15106 (2021)
11. F. Xie, H. Wen, Y. Li et al., Optimized coherent integration-based radio frequency fingerprinting in internet of things.
IEEE Internet Things J. 5(5), 3967–3977 (2018)
12. Y. Lin, H. Zha, Y. Tu, S. Zhang, W. Yan, C. Xu, GLR-SEI: green and low resource specific emitter identification based on
complex networks and fisher pruning. IEEE Trans. Emerg. Top. Comput. Intell. https://​doi.​org/​10.​1109/​TETCI.​2023.​
33030​92.
13. D. Nouichi, M. Abdelsalam, Q. Nasir, S. Abbas, IoT devices security using RF fingerprinting. In: 2019 Advances in Sci-
ence and Engineering Technology International Conferences (ASET), Dubai, United Arab Emirates, pp. 1–7 (2019)
14. H. Zha, H. Wang, Z. Feng et al., LT-SEI: Long-tailed specific emitter identification based on decoupled representation
learning in low-resource scenarios. IEEE Trans. Intell. Transp. Syst. https://​doi.​org/​10.​1109/​TITS.​2023.​33087​16
15. A. Wyner, The wire-tap channel. Bell Syst. Tech. 54(8), 1355–1387 (1975)
16. J.K. Tugnait, Pilot spoofing attack detection and countermeasure. IEEE Trans. Commun. 66(5), 2093–2106 (2018)
17. B.-Q. Zhao, H.-M. Wang, P. Liu, Safeguarding RFID wireless communication against proactive eavesdropping. IEEE
Internet Things J. 7(12), 11587–11600 (2020)
18. H. Xu, L. Sun, Wireless surveillance via proactive eavesdropping and rotated jamming. IEEE Trans. Veh. Technol.
68(11), 10713–10727 (2019)
19. S. Tu, J. Si, Z. Cheng, L. Guan, C. Wang, Performance of covert surveillance via proactive eavesdropping. In: 2020
International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, pp. 1–6 (2020)
20. S.E. Quincozes, D. Mosse, D. Passos, C. Albuquerque, L.S. Ochi, V.F. dos Santos, On the performance of GRASP-based
feature selection for CPS intrusion detection. IEEE Trans. Netw. Serv. Manag. 19(1), 614–626 (2022)
21. X. Liu, Q.Q. Sun, W.D. Lu, C.L. Wu, H. Ding, Big-data-based intelligent spectrum sensing for heterogenfous spectrum
communications in 5G. IEEE Wirel. Commun. 27(5), 67–73 (2020)
22. Y. Guo, R. Zhao, S. Lai, L. Fan, X. Lei, G.K. Karagiannidis, Distributed machine learning for multiuser mobile edge
computing systems. IEEE J. Sel. Top. Signal Process. 16(3), 460–473 (2022)
23. T.M. Hoang, T.Q. Duong, H.D. Tuan, S. Lambotharan, L. Hanzo, Physical layer security: detection of active eavesdrop-
ping attacks by support vector machines. IEEE Access 9, 31595–31607 (2021)
24. Z. Zhao, Q. Du, H. Song, Traffic-load learning towards early detection of intrusion in industrial MMTC networks. IEEE
Trans. Ind. Inf 1–10 (2022)
25. T.M. Hoang, N.M. Nguyen, T.Q. Duong, Detection of eavesdropping attack in UAV-aided wireless systems: unsuper-
vised learning with one-class SVM and K-means clustering. IEEE Wirel. Commun. Lett. 9(2), 139–142 (2020)
26. A. Weinand, M. Karrenbauer, R. Sattiraju, H. Schotten, Application of machine learning for channel based message
authentication in mission critical machine type communication in processing. 23rd Eur. Wireless, Dresden, Germany,
pp. 342–346 (2017)
27. X. Qiu, T. Jiang, S. Wu, M. Hayes, Physical layer authentication enhancement using a Gaussian mixture model. IEEE
Access 6, 53583–53592 (2018)
28. L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, PHY-layer spoofing detection with reinforcement learning in wireless net-
works. IEEE Trans. Veh. Technol. 65(12), 10037–10047 (2017)
29. X. Liu, C. Sun, M. Zhou, C. Wu, B. Peng, P. Li, Reinforcement learning-based multislot double-threshold spectrum
sensing with bayesian fusion for industrial big spectrum data. IEEE Trans. Ind. Inf. 17(5), 3391–3440 (2021)
30. Z. Bao, Y. Lin, S. Zhang, Z. Li, S. Mao, Threat of adversarial attacks on DL-based IoT device identification. IEEE Internet
Things J. 9(11), 9012–9024 (2021)
31. S. Wu, Y. Jiang, H. Luo, X. Li, Deep learning-based defense and detection scheme against eavesdropping and typical
cyber-physical attacks. In: 2021 CAA Symposium on Fault Detection, Supervision and Safety for Technical Process
(SAFERPROCESS), Chengdu, China, pp. 1–6 (2021)
32. M. Umar, A. Sabo, A.A. Tata, Modified cooperative bait detection scheme for detecting and preventing cooperative
blackhole and eavesdropping attacks in MANET. In: 2018 International Conference on Networking and Network
Applications (NANA), Xi’an, China, pp. 121–126 (2018)
33. X. Xu, Y. Wang, W.-P. Zhu, X. Hong, Y. Zou, Energy-efficient defensive strategy against hybrid SSDF/eavesdropping
attacks over Nakagami-M Channels. IEEE Commun. Lett. 22(4), 856–859 (2018)
Li and Dou EURASIP Journal on Advances in Signal Processing (2023) 2023:119 Page 19 of 19

34. C. Hou, G. Liu, Q. Tian, Z. Zhou, L. Hua, Y. Lin, Multisignal modulation classification using sliding window detection
and complex convolutional network in frequency domain. IEEE Internet Things J. 9(19), 19438–19449 (2022)
35. Z. Yao, X. Fu, L.T. Guo et al. Few-shot specific emitter identification using asymmetric masked auto-encoder. IEEE
Commun. Lett. https://​doi.​org/​10.​1109/​LCOMM.​2023.​33126​69(2023)
36. Q.W. Dong, Application of Keras-based deep learning algorithm in structured data classification. J. JIAMUSI Univ.
(Natural Science Edition). 40(04):47–49+54 (2022)
37. C. Liu, X. Fu, Y. Wang, L.T. Guo, Y.C. Liu, Y. Lin, et al. Overcoming data limitations: a few-shot specific emitter identifica-
tion method using self-supervised learning and adversarial augmentation. https://​doi.​org/​10.​1109/​TIFS.​2023.​33243​
94 (2023)
38. Y. Tu, Y. Lin, H. Zha, J. Zhang et al., Large-scale real-world radio signal recognition with deep learning. Chin. J. Aero-
naut. 35(9), 35–48 (2022)
39. J. Yang, H. Gao, Cultural emperor penguin optimizer and its application for face recognition. Math. Probl. Eng. 2020
(2020)
40. M. Yu, G. Dong, R. Xu, G. Yu, Precision time base source calibration prediction model based on BP neural network.
China Test 1–7 (2023)
41. W. Hu, H. Jia, Automobile fault diagnosis method based on improved AFSA optimized BP neural network. Mech.
Des. Manuf. Eng. 51(11), 77–80 (2022)
42. Y. Zhao, L. Ge, H. Xie et al., ASTF: visual abstractions of time-varying patterns in radio signals. IEEE Trans. Vis. Comput.
Graph. 29(1), 214–224 (2023)

Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy