Tracing Malicious Relays in Cooperative Wireless Communications

A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This pap...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2007-06, Vol.2 (2), p.198-212
Hauptverfasser: Mao, Y., Wu, M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 212
container_issue 2
container_start_page 198
container_title IEEE transactions on information forensics and security
container_volume 2
creator Mao, Y.
Wu, M.
description A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme
doi_str_mv 10.1109/TIFS.2007.897242
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_875033940</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4202570</ieee_id><sourcerecordid>2332333811</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</originalsourceid><addsrcrecordid>eNpdkM1LAzEUxIMoWKt3wcvixdPWl2ST7J5EilWhImjFY8imbyVlP2rSFfrfm2WlB0_vMfxmGIaQSwozSqG4XT0v3mcMQM3yQrGMHZEJFUKmEhg9PvyUn5KzEDYAWUZlPiF3K2-sa7-SF1M767o-JG9Ym31IXJvMu26L3uzcDyafzmONIUSxafrW2Sh3bTgnJ5WpA1783Sn5WDys5k_p8vXxeX6_TC1nbJeWvKwMZWswBUMBqpIlFoBSlCZXvIQMWWGVQJ5hBRGVOTCuSmn5mlNuLZ-SmzF367vvHsNONy5YrGvTYiytcyWA8yKDSF7_Izdd79tYTueS5yKXaoBghKzvQvBY6a13jfF7TUEPe-phTz3sqcc9o-VqtDhEPOAZAyZi4C-fp3D9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>863858670</pqid></control><display><type>article</type><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Mao, Y. ; Wu, M.</creator><creatorcontrib>Mao, Y. ; Wu, M.</creatorcontrib><description>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2007.897242</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Adaptive signal detection ; Adversary tracing ; Communication system security ; Computer information security ; Context ; cooperative communications ; Cryptography ; Decoding ; Detectors ; Error analysis ; Mathematical analysis ; Relays ; security ; Signal detection ; signal garbling ; Simulation ; Statistics ; Strategy ; Studies ; Wireless communication ; Wireless communications</subject><ispartof>IEEE transactions on information forensics and security, 2007-06, Vol.2 (2), p.198-212</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</citedby><cites>FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4202570$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4202570$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mao, Y.</creatorcontrib><creatorcontrib>Wu, M.</creatorcontrib><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</description><subject>Adaptive signal detection</subject><subject>Adversary tracing</subject><subject>Communication system security</subject><subject>Computer information security</subject><subject>Context</subject><subject>cooperative communications</subject><subject>Cryptography</subject><subject>Decoding</subject><subject>Detectors</subject><subject>Error analysis</subject><subject>Mathematical analysis</subject><subject>Relays</subject><subject>security</subject><subject>Signal detection</subject><subject>signal garbling</subject><subject>Simulation</subject><subject>Statistics</subject><subject>Strategy</subject><subject>Studies</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkM1LAzEUxIMoWKt3wcvixdPWl2ST7J5EilWhImjFY8imbyVlP2rSFfrfm2WlB0_vMfxmGIaQSwozSqG4XT0v3mcMQM3yQrGMHZEJFUKmEhg9PvyUn5KzEDYAWUZlPiF3K2-sa7-SF1M767o-JG9Ym31IXJvMu26L3uzcDyafzmONIUSxafrW2Sh3bTgnJ5WpA1783Sn5WDys5k_p8vXxeX6_TC1nbJeWvKwMZWswBUMBqpIlFoBSlCZXvIQMWWGVQJ5hBRGVOTCuSmn5mlNuLZ-SmzF367vvHsNONy5YrGvTYiytcyWA8yKDSF7_Izdd79tYTueS5yKXaoBghKzvQvBY6a13jfF7TUEPe-phTz3sqcc9o-VqtDhEPOAZAyZi4C-fp3D9</recordid><startdate>20070601</startdate><enddate>20070601</enddate><creator>Mao, Y.</creator><creator>Wu, M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>20070601</creationdate><title>Tracing Malicious Relays in Cooperative Wireless Communications</title><author>Mao, Y. ; Wu, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-b3bfa12d0a92e507f6be90e65ba873b04e29c75e34ef0bfa680237b6c3d313cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Adaptive signal detection</topic><topic>Adversary tracing</topic><topic>Communication system security</topic><topic>Computer information security</topic><topic>Context</topic><topic>cooperative communications</topic><topic>Cryptography</topic><topic>Decoding</topic><topic>Detectors</topic><topic>Error analysis</topic><topic>Mathematical analysis</topic><topic>Relays</topic><topic>security</topic><topic>Signal detection</topic><topic>signal garbling</topic><topic>Simulation</topic><topic>Statistics</topic><topic>Strategy</topic><topic>Studies</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mao, Y.</creatorcontrib><creatorcontrib>Wu, M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mao, Y.</au><au>Wu, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Tracing Malicious Relays in Cooperative Wireless Communications</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2007-06-01</date><risdate>2007</risdate><volume>2</volume><issue>2</issue><spage>198</spage><epage>212</epage><pages>198-212</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this emerging technology is promising in improving communication quality, some security problems inherent to cooperative relay also arise. This paper investigates the security issues in cooperative communications under the context of multiple relay nodes using decode-and-forward strategy, where one of the relay nodes is adversarial and tries to corrupt the communications by sending garbled signals. We show that the conventional physical-layer signal detector will lead to a high error rate in signal detection in such a scenario, and the application-layer cryptography alone will not be able to distinguish the adversarial relay from legitimate ones. To trace and identify the adversarial relay, we propose a cross-layer tracing scheme that uses adaptive signal detection at the physical layer, coupled with pseudorandom tracing symbols at the application layer. Analytical results for tracing statistics as well as experimental simulations are presented to demonstrate the effectiveness of the proposed tracing scheme</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2007.897242</doi><tpages>15</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2007-06, Vol.2 (2), p.198-212
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_miscellaneous_875033940
source IEEE Electronic Library (IEL)
subjects Adaptive signal detection
Adversary tracing
Communication system security
Computer information security
Context
cooperative communications
Cryptography
Decoding
Detectors
Error analysis
Mathematical analysis
Relays
security
Signal detection
signal garbling
Simulation
Statistics
Strategy
Studies
Wireless communication
Wireless communications
title Tracing Malicious Relays in Cooperative Wireless Communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T07%3A11%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Tracing%20Malicious%20Relays%20in%20Cooperative%20Wireless%20Communications&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Mao,%20Y.&rft.date=2007-06-01&rft.volume=2&rft.issue=2&rft.spage=198&rft.epage=212&rft.pages=198-212&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2007.897242&rft_dat=%3Cproquest_RIE%3E2332333811%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=863858670&rft_id=info:pmid/&rft_ieee_id=4202570&rfr_iscdi=true