Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the de...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8094850/ |
id |
doaj-3378658e49d04f34be029c9f3c84bfd9 |
---|---|
record_format |
Article |
spelling |
doaj-3378658e49d04f34be029c9f3c84bfd92021-03-29T20:18:16ZengIEEEIEEE Access2169-35362017-01-015259272594510.1109/ACCESS.2017.27698028094850Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless NetworksRuohan Cao0https://orcid.org/0000-0002-0754-2297Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of EducationThis paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the destination observe some secured signals that are not attacked. Then, a detection scheme is developed for the destination by using its secured observations to statistically check other observations from the relay. On the other hand, notice the Gaussian channel is continuous, which allows the possible Byzantine attacks to be conducted within continuous alphabet(s). The existing work on discrete channel is not applicable for investigating the performance of the proposed scheme. The main contribution of this paper is to prove that if and only if the wireless relay network satisfies a non-manipulable channel condition, the proposed detection scheme achieves asymptotic errorless performance against arbitrary attacks that allow the stochastic distributions of altered symbols to vary arbitrarily and depend on each other. No pre-shared secret or secret transmission is needed for the detection. Furthermore, we also prove that the relay network is non-manipulable as long as all the channel coefficients are non-zero, which is not essential restrict for many practical systems.https://ieeexplore.ieee.org/document/8094850/Byzantine attackphysical-layer securitychannel non-manipulability |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ruohan Cao |
spellingShingle |
Ruohan Cao Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks IEEE Access Byzantine attack physical-layer security channel non-manipulability |
author_facet |
Ruohan Cao |
author_sort |
Ruohan Cao |
title |
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks |
title_short |
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks |
title_full |
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks |
title_fullStr |
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks |
title_full_unstemmed |
Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks |
title_sort |
detecting arbitrary attacks using continuous secured side information in wireless networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2017-01-01 |
description |
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the destination observe some secured signals that are not attacked. Then, a detection scheme is developed for the destination by using its secured observations to statistically check other observations from the relay. On the other hand, notice the Gaussian channel is continuous, which allows the possible Byzantine attacks to be conducted within continuous alphabet(s). The existing work on discrete channel is not applicable for investigating the performance of the proposed scheme. The main contribution of this paper is to prove that if and only if the wireless relay network satisfies a non-manipulable channel condition, the proposed detection scheme achieves asymptotic errorless performance against arbitrary attacks that allow the stochastic distributions of altered symbols to vary arbitrarily and depend on each other. No pre-shared secret or secret transmission is needed for the detection. Furthermore, we also prove that the relay network is non-manipulable as long as all the channel coefficients are non-zero, which is not essential restrict for many practical systems. |
topic |
Byzantine attack physical-layer security channel non-manipulability |
url |
https://ieeexplore.ieee.org/document/8094850/ |
work_keys_str_mv |
AT ruohancao detectingarbitraryattacksusingcontinuoussecuredsideinformationinwirelessnetworks |
_version_ |
1724194866775195648 |