Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge

被引:29
作者
Boche, Holger [1 ,2 ]
Schaefer, Rafael F. [3 ]
Poor, H. Vincent [4 ]
机构
[1] Tech Univ Munich, Inst Theoret Informat Technol, D-80290 Munich, Germany
[2] Munich Ctr Quantum Sci & Technol MCQST, D-80799 Munich, Germany
[3] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10587 Berlin, Germany
[4] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Jamming; Denial-of-service attack; Turing machines; Electronic mail; Information processing; Wireless communication; adversarial attacks; detectability of denial-of-service (DoS) attacks; algorithmic computability; WIRETAP CHANNEL; CAPACITY;
D O I
10.1109/TSP.2020.2993165
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless communication systems are inherently vulnerable to intentional jamming. In this paper, two classes of such jammers are considered: those with partial and full knowledge. While the first class accounts for those jammers that know the encoding and decoding function, the latter accounts for those that are further aware of the actual transmitted message. Of particular interest are so-called denial-of-service (DoS) attacks in which the jammer is able to completely disrupt any transmission. Accordingly, it is of crucial interest for the legitimate users to detect such adversarial DoS attacks. This paper develops a detection framework based on Turing machines. Turing machines have no limitations on computational complexity and computing capacity and storage and can simulate any given algorithm. For both scenarios of a jammer with partial and full knowledge, it is shown that there exists no Turing machine which can decide whether or not a DoS attack is possible for a given channel and the corresponding decision problem is undecidable. On the other hand, it is shown for both scenarios that it is possible to algorithmically characterize those channels for which a DoS attack is not possible. This means that it is possible to detect those scenarios in which the jammer is not able to disrupt the communication. For all other channels, the Turing machine does not stop and runs forever making this decision problem semidecidable. Finally, it is shown that additional coordination resources such as common randomness make the communication robust against such attacks.
引用
收藏
页码:3754 / 3768
页数:15
相关论文
共 48 条
[1]   Correlated sources help transmission over an arbitrarily varying channel [J].
Ahlswede, R ;
Cai, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (04) :1254-1255
[2]   A NOTE ON EXISTENCE OF WEAK CAPACITY FOR CHANNELS WITH ARBITRARILY VARYING CHANNEL PROBABILITY FUNCTIONS AND ITS RELATION TO SHANNONS ZERO ERROR CAPACITY [J].
AHLSWEDE, R .
ANNALS OF MATHEMATICAL STATISTICS, 1970, 41 (03) :1027-+
[3]   ELIMINATION OF CORRELATION IN RANDOM CODES FOR ARBITRARILY VARYING CHANNELS [J].
AHLSWEDE, R .
ZEITSCHRIFT FUR WAHRSCHEINLICHKEITSTHEORIE UND VERWANDTE GEBIETE, 1978, 44 (02) :159-175
[4]   Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels [J].
Ahlswede, Rudolf ;
Bjelakovic, Igor ;
Boche, Holger ;
Notzel, Janis .
COMMUNICATIONS IN MATHEMATICAL PHYSICS, 2013, 317 (01) :103-156
[5]   Smart Grid-Safe, Secure, Self-Healing [J].
Amin, S. Massoud ;
Giacomoni, Anthony M. .
IEEE POWER & ENERGY MAGAZINE, 2011, 10 (01) :33-40
[6]  
[Anonymous], 1952, INTRO METAMATHEMATIC
[7]  
[Anonymous], 2014, THE TACTILE INTERNET
[8]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[9]  
[Anonymous], COLLABORATIVE FINANC
[10]  
Avigad J., 2014, TURINGS LEGACY DEV T