Physical Integrity Check in Cooperative Relay Communications

We propose a physical-layer technique for checking the integrity of information provided by an intermediate node (relay) in cooperative relay communication systems. The proposed approach, built on the theory of likelihood ratio test, exploits the physical-layer signal from the source in detecting any data modification (false data injection attack) made by the relay. We present the optimum detection method that minimizes the end-to-end outage probability and the minmax detection method that minimizes the maximum possible outage probability under unknown attack probability. We show that the optimum detection technique can provide almost the same end-to-end outage probability that can be provided by the ideal cryptographic technique that perfectly detects the false injection at the expense of high computational cost and bandwidth overhead. The proposed physical integrity check can be used as an additional layer of protection or can complement to the conventional cryptographic techniques.

[1]  Aria Nosratinia,et al.  Coded cooperation in wireless communications: space-time transmission and iterative decoding , 2004, IEEE Transactions on Signal Processing.

[2]  Guiling Wang,et al.  Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[4]  Sang Wu Kim,et al.  Error probability in multi-source, multi-relay networks under falsified data injection attacks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[5]  H.T. Sencar,et al.  Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.

[6]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[7]  R. Gallager Principles of Digital Communication , 2008 .

[8]  Wan-Jen Huang,et al.  Misbehavior Detection Without Channel Information in Cooperative Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[9]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[10]  Stefano Tomasin Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks , 2011, IEEE Communications Letters.

[11]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Stefano Tomasin,et al.  Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ , 2010, IEEE Transactions on Wireless Communications.

[13]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[14]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[15]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[16]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[17]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  N. Memon,et al.  Detection of misbehavior in cooperative diversity , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[20]  Mihail L. Sichitiu,et al.  Simple, accurate time synchronization for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[21]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[22]  J. Elson,et al.  Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.

[23]  Xiaodong Wang,et al.  Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.

[24]  Muriel Médard,et al.  An algebraic watchdog for wireless network coding , 2009, 2009 IEEE International Symposium on Information Theory.

[25]  Sang Wu Kim,et al.  Check-Sum Aided MAP Detection of Relay Misbehavior in Wireless Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[26]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.