Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks

This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the de...

Full description

Bibliographic Details
Main Author: Ruohan Cao
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8094850/
id doaj-3378658e49d04f34be029c9f3c84bfd9
record_format Article
spelling doaj-3378658e49d04f34be029c9f3c84bfd92021-03-29T20:18:16ZengIEEEIEEE Access2169-35362017-01-015259272594510.1109/ACCESS.2017.27698028094850Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless NetworksRuohan Cao0https://orcid.org/0000-0002-0754-2297Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of EducationThis paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the destination observe some secured signals that are not attacked. Then, a detection scheme is developed for the destination by using its secured observations to statistically check other observations from the relay. On the other hand, notice the Gaussian channel is continuous, which allows the possible Byzantine attacks to be conducted within continuous alphabet(s). The existing work on discrete channel is not applicable for investigating the performance of the proposed scheme. The main contribution of this paper is to prove that if and only if the wireless relay network satisfies a non-manipulable channel condition, the proposed detection scheme achieves asymptotic errorless performance against arbitrary attacks that allow the stochastic distributions of altered symbols to vary arbitrarily and depend on each other. No pre-shared secret or secret transmission is needed for the detection. Furthermore, we also prove that the relay network is non-manipulable as long as all the channel coefficients are non-zero, which is not essential restrict for many practical systems.https://ieeexplore.ieee.org/document/8094850/Byzantine attackphysical-layer securitychannel non-manipulability
collection DOAJ
language English
format Article
sources DOAJ
author Ruohan Cao
spellingShingle Ruohan Cao
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
IEEE Access
Byzantine attack
physical-layer security
channel non-manipulability
author_facet Ruohan Cao
author_sort Ruohan Cao
title Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
title_short Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
title_full Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
title_fullStr Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
title_full_unstemmed Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
title_sort detecting arbitrary attacks using continuous secured side information in wireless networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2017-01-01
description This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the destination observe some secured signals that are not attacked. Then, a detection scheme is developed for the destination by using its secured observations to statistically check other observations from the relay. On the other hand, notice the Gaussian channel is continuous, which allows the possible Byzantine attacks to be conducted within continuous alphabet(s). The existing work on discrete channel is not applicable for investigating the performance of the proposed scheme. The main contribution of this paper is to prove that if and only if the wireless relay network satisfies a non-manipulable channel condition, the proposed detection scheme achieves asymptotic errorless performance against arbitrary attacks that allow the stochastic distributions of altered symbols to vary arbitrarily and depend on each other. No pre-shared secret or secret transmission is needed for the detection. Furthermore, we also prove that the relay network is non-manipulable as long as all the channel coefficients are non-zero, which is not essential restrict for many practical systems.
topic Byzantine attack
physical-layer security
channel non-manipulability
url https://ieeexplore.ieee.org/document/8094850/
work_keys_str_mv AT ruohancao detectingarbitraryattacksusingcontinuoussecuredsideinformationinwirelessnetworks
_version_ 1724194866775195648