2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195821
|View full text |Cite
|
Sign up to set email alerts
|

Detection of channel degradation attack by Intermediary Node in Linear Networks

Abstract: We consider the problem of two sources wanting to share information through a potentially untrustworthy intermediary node. We assume that the two sources transmit random symbols simultaneously and that the intermediary node relays the information in the amplify-and-forward manner. We show that under a certain sufficient condition on the channel, it is possible to asymptotically detect whether or not the intermediary node is degrading the channel by sending out manipulated symbols. This can be done solely by ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
12
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 30 publications
(27 reference statements)
1
12
0
Order By: Relevance
“…Remark 1: Theorem 1 gives the detectability of continuous attacks over continuous channels. It extends the the detectability of discrete attacks given by [16] into continuous form. This extension is not trivial based on twofold work of this paper.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Remark 1: Theorem 1 gives the detectability of continuous attacks over continuous channels. It extends the the detectability of discrete attacks given by [16] into continuous form. This extension is not trivial based on twofold work of this paper.…”
Section: Resultsmentioning
confidence: 99%
“…Firstly, we prove the convergence of F n Y n | X n (t | x ) (24) is established for arbitrary sufficient large n rather than fixed n , where the involved variables X, U , and V do not follow markov constraint. For completing such proof work, it is not available to straightforwardly use the methods of [16], which processes the discrete variables following markov constraint and having fixed dimensions of their alphabets. Secondly, the checking problem for non-manipulability of continuous channel is to check number of solutions to an integral equation.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it is difficult to extend this scheme to non-Gaussian channels. In our previous work [13]- [15], we show that for TWR networks with discrete memoryless channels (DMCs), it is possible to detect potential Byzantine attacks without any AMD code or cryptographic keys. The basic idea is that each node utilizes its own transmitted symbols as a clean reference for statistically checking against the other node's symbols forwarded by the relay.…”
Section: Introductionmentioning
confidence: 99%