Physical Integrity Check in Cooperative Relay Communications

被引:17
作者
Kim, Sang Wu [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
Physical integrity check; false data injection attack; likelihood ratio test; optimum detection; minmax detection; cooperative relay communications; INJECTED FALSE DATA; WIRELESS; NETWORKS; PROTOCOL;
D O I
10.1109/TWC.2015.2453353
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a physical-layer technique for checking the integrity of information provided by an intermediate node (relay) in cooperative relay communication systems. The proposed approach, built on the theory of likelihood ratio test, exploits the physical-layer signal from the source in detecting any data modification (false data injection attack) made by the relay. We present the optimum detection method that minimizes the end-to-end outage probability and the minmax detection method that minimizes the maximum possible outage probability under unknown attack probability. We show that the optimum detection technique can provide almost the same end-to-end outage probability that can be provided by the ideal cryptographic technique that perfectly detects the false injection at the expense of high computational cost and bandwidth overhead. The proposed physical integrity check can be used as an additional layer of protection or can complement to the conventional cryptographic techniques.
引用
收藏
页码:6401 / 6413
页数:13
相关论文
共 25 条
  • [1] [Anonymous], 2008, PRINCIPLES DIGITAL C
  • [2] Dehnie Sintayehu, 2007, 2007 IEEE Sarnoff Symposium, P1, DOI 10.1109/SARNOF.2007.4567377
  • [3] Dehnie S., 2008, P IEEE MILCOM NOV, P1
  • [4] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [5] Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
    Dehnie, Sintayehu
    Tomasin, Stefano
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (07) : 2328 - 2337
  • [6] Fine-grained network time synchronization using reference broadcasts
    Elson, J
    Girod, L
    Estrin, D
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 147 - 163
  • [7] Ariadne: A secure on-demand routing protocol for ad hoc networks
    Hu, YC
    Perrig, A
    Johnson, DB
    [J]. WIRELESS NETWORKS, 2005, 11 (1-2) : 21 - 38
  • [8] Coded cooperation in wireless communications: Space-time transmission and iterative decoding
    Janani, M
    Hedayat, A
    Hunter, TE
    Nosratinia, A
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (02) : 362 - 371
  • [9] Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
    Kehdi, Elias
    Li, Baochun
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1224 - 1232
  • [10] Khalaf T. A., 2008, P IEEE MILCOM NOV, P1