Tracing Malicious Relays in Cooperative Wireless Communications
A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This pap...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2007-06, Vol.2 (2), p.198-212 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 212 |
---|---|
container_issue | 2 |
container_start_page | 198 |
container_title | IEEE transactions on information forensics and security |
container_volume | 2 |
creator | Mao, Y. Wu, M. |
description | A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme |
doi_str_mv | 10.1109/TIFS.2007.897242 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_875033940</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4202570</ieee_id><sourcerecordid>2332333811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</originalsourceid><addsrcrecordid>eNpdkM1LAzEUxIMoWKt3wcvixdPWl2ST7J5EilWhImjFY8imbyVlP2rSFfrfm2WlB0_vMfxmGIaQSwozSqG4XT0v3mcMQM3yQrGMHZEJFUKmEhg9PvyUn5KzEDYAWUZlPiF3K2-sa7-SF1M767o-JG9Ym31IXJvMu26L3uzcDyafzmONIUSxafrW2Sh3bTgnJ5WpA1783Sn5WDys5k_p8vXxeX6_TC1nbJeWvKwMZWswBUMBqpIlFoBSlCZXvIQMWWGVQJ5hBRGVOTCuSmn5mlNuLZ-SmzF367vvHsNONy5YrGvTYiytcyWA8yKDSF7_Izdd79tYTueS5yKXaoBghKzvQvBY6a13jfF7TUEPe-phTz3sqcc9o-VqtDhEPOAZAyZi4C-fp3D9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>863858670</pqid></control><display><type>article</type><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Mao, Y. ; Wu, M.</creator><creatorcontrib>Mao, Y. ; Wu, M.</creatorcontrib><description>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2007.897242</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Adaptive signal detection ; Adversary tracing ; Communication system security ; Computer information security ; Context ; cooperative communications ; Cryptography ; Decoding ; Detectors ; Error analysis ; Mathematical analysis ; Relays ; security ; Signal detection ; signal garbling ; Simulation ; Statistics ; Strategy ; Studies ; Wireless communication ; Wireless communications</subject><ispartof>IEEE transactions on information forensics and security, 2007-06, Vol.2 (2), p.198-212</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</citedby><cites>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4202570$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4202570$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mao, Y.</creatorcontrib><creatorcontrib>Wu, M.</creatorcontrib><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</description><subject>Adaptive signal detection</subject><subject>Adversary tracing</subject><subject>Communication system security</subject><subject>Computer information security</subject><subject>Context</subject><subject>cooperative communications</subject><subject>Cryptography</subject><subject>Decoding</subject><subject>Detectors</subject><subject>Error analysis</subject><subject>Mathematical analysis</subject><subject>Relays</subject><subject>security</subject><subject>Signal detection</subject><subject>signal garbling</subject><subject>Simulation</subject><subject>Statistics</subject><subject>Strategy</subject><subject>Studies</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkM1LAzEUxIMoWKt3wcvixdPWl2ST7J5EilWhImjFY8imbyVlP2rSFfrfm2WlB0_vMfxmGIaQSwozSqG4XT0v3mcMQM3yQrGMHZEJFUKmEhg9PvyUn5KzEDYAWUZlPiF3K2-sa7-SF1M767o-JG9Ym31IXJvMu26L3uzcDyafzmONIUSxafrW2Sh3bTgnJ5WpA1783Sn5WDys5k_p8vXxeX6_TC1nbJeWvKwMZWswBUMBqpIlFoBSlCZXvIQMWWGVQJ5hBRGVOTCuSmn5mlNuLZ-SmzF367vvHsNONy5YrGvTYiytcyWA8yKDSF7_Izdd79tYTueS5yKXaoBghKzvQvBY6a13jfF7TUEPe-phTz3sqcc9o-VqtDhEPOAZAyZi4C-fp3D9</recordid><startdate>20070601</startdate><enddate>20070601</enddate><creator>Mao, Y.</creator><creator>Wu, M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20070601</creationdate><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><author>Mao, Y. ; Wu, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Adaptive signal detection</topic><topic>Adversary tracing</topic><topic>Communication system security</topic><topic>Computer information security</topic><topic>Context</topic><topic>cooperative communications</topic><topic>Cryptography</topic><topic>Decoding</topic><topic>Detectors</topic><topic>Error analysis</topic><topic>Mathematical analysis</topic><topic>Relays</topic><topic>security</topic><topic>Signal detection</topic><topic>signal garbling</topic><topic>Simulation</topic><topic>Statistics</topic><topic>Strategy</topic><topic>Studies</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mao, Y.</creatorcontrib><creatorcontrib>Wu, M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mao, Y.</au><au>Wu, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Tracing Malicious Relays in Cooperative Wireless Communications</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2007-06-01</date><risdate>2007</risdate><volume>2</volume><issue>2</issue><spage>198</spage><epage>212</epage><pages>198-212</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2007.897242</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2007-06, Vol.2 (2), p.198-212 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_miscellaneous_875033940 |
source | IEEE Electronic Library (IEL) |
subjects | Adaptive signal detection Adversary tracing Communication system security Computer information security Context cooperative communications Cryptography Decoding Detectors Error analysis Mathematical analysis Relays security Signal detection signal garbling Simulation Statistics Strategy Studies Wireless communication Wireless communications |
title | Tracing Malicious Relays in Cooperative Wireless Communications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T07%3A11%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Tracing%20Malicious%20Relays%20in%20Cooperative%20Wireless%20Communications&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Mao,%20Y.&rft.date=2007-06-01&rft.volume=2&rft.issue=2&rft.spage=198&rft.epage=212&rft.pages=198-212&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2007.897242&rft_dat=%3Cproquest_RIE%3E2332333811%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=863858670&rft_id=info:pmid/&rft_ieee_id=4202570&rfr_iscdi=true |